(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2215 articles

ESET Research

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

ESET Research

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.

Stephen Cobb10 Nov 2017


ESET Research

Learn how a research lab works

Learn how a research lab works

ESET Research

Learn how a research lab works

The story of viruses took place in a university laboratory and, keeping in mind the parallelism, we want to show you what is a malware research laboratory like and what exactly happens there.

Santiago Sassone02 Nov 2017


ESET Research

Windigo Still not Windigone: An Ebury Update

Windigo Still not Windigone: An Ebury Update

ESET Research

Windigo Still not Windigone: An Ebury Update

In 2014, ESET researchers wrote a blog post about an OpenSSH backdoor and credential stealer called Linux/Ebury In 2017, the team found a new Ebury sample.

Frédéric Vachon30 Oct 2017


Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

Bad Rabbit: Not-Petya is back with improved ransomware

Critical Infrastructure, Ransomware, Ukraine Crisis – Digital Security Resource Center

Bad Rabbit: Not-Petya is back with improved ransomware

A new ransomware outbreak today has hit some major infrastructure in Ukraine including Kiev metro. Here are some details about this new variant of Petya.

Marc-Etienne M.Léveillé24 Oct 2017


ESET Research

Fake cryptocurrency trading apps on Google Play

Fake cryptocurrency trading apps on Google Play

ESET Research

Fake cryptocurrency trading apps on Google Play

With all the hype around cryptocurrencies, cybercriminals are trying to grab whatever new opportunity they can – be it hijacking users’ computing power to mine cryptocurrencies via browsers or by compromising unpatched machines, or various scam schemes utilizing phishing websites and fake apps.

Lukas Stefanko23 Oct 2017


ESET Research

OSX/Proton spreading again through supply-chain attack

OSX/Proton spreading again through supply-chain attack

ESET Research

OSX/Proton spreading again through supply-chain attack

Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.

ESET Research20 Oct 2017


ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker: Innovative Android Ransomware

ESET Research, Mobile Security

DoubleLocker: Innovative Android Ransomware

DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.

ESET Research13 Oct 2017


ESET Research

Money-making machine: Monero-mining malware

Money-making machine: Monero-mining malware

ESET Research

Money-making machine: Monero-mining malware

While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.

Peter Kálnai and Michal Poslušný28 Sep 2017


ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

BankBot trojan returns to Google Play with new tricks

ESET Research, Mobile Security

BankBot trojan returns to Google Play with new tricks

The Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again and contains new tricks designed to get access to the private banking information of the user.

Lukas Stefanko25 Sep 2017