Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-29 09:00:00 |
Méfiez-vous des faux outils d'IA masquant des menaces de logiciels malveillants très réels Beware of fake AI tools masking very real malware threats (lien direct) |
Toujours à l'écoute des dernières tendances, les cybercriminels distribuent des outils malveillants qui se présentent en tant que chatppt, midjourney et autres assistants génératifs de l'IA
Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants |
Malware
Tool
|
ChatGPT
|
|
|
2024-07-21 07:24:11 |
Comment les logiciels publicitaires ont exposé les victimes aux threads au niveau du noyau et # 8211;Semaine en sécurité avec Tony Anscombe How adware exposed victims to kernel-level threats – Week in Security with Tony Anscombe (lien direct) |
Un prétendu bloqueur d'annonces commercialisé en tant que solution de sécurité cache des logiciels malveillants au niveau du noyau qui expose par inadvertance les victimes à des menaces encore plus dangereuses
A purported ad blocker marketed as a security solution hides kernel-level malware that inadvertently exposes victims to even more dangerous threats |
Malware
|
|
★★
|
|
2024-07-01 09:30:00 |
Détourné: comment les chaînes YouTube piratées répartissent les escroqueries et les logiciels malveillants Hijacked: How hacked YouTube channels spread scams and malware (lien direct) |
Voici comment les cybercriminels vont après les canaux YouTube et les utilisent comme conduits pour la fraude & # 8211;Et ce que vous devriez faire attention lorsque vous regardez des vidéos sur la plateforme
Here\'s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform |
Malware
|
|
★★★
|
|
2024-05-14 10:50:52 |
Ebury est vivant mais invisible: 400k serveurs Linux compromis pour le vol de crypto-monnaie et le gain financier Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain (lien direct) |
L'une des campagnes de logiciels malveillants côté serveur les plus avancées est toujours en croissance, avec des centaines de milliers de serveurs compromis, et il s'est diversifié pour inclure la carte de crédit et le vol de crypto-monnaie
One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft |
Malware
|
|
★★
|
|
2024-04-12 14:05:06 |
La visite exotique comprend des logiciels malveillants XploitSpy & # 8211;Semaine en sécurité avec Tony Anscombe eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe (lien direct) |
Près de 400 personnes en Inde et au Pakistan ont été victimes d'une campagne d'espionnage Android en cours appelée Exotic Visit
Almost 400 people in India and Pakistan have fallen victim to an ongoing Android espionage campaign called eXotic Visit |
Malware
Mobile
|
|
★★
|
|
2024-04-02 09:30:00 |
Des logiciels malveillants se cachent dans les photos?Plus probable que vous ne le pensez Malware hiding in pictures? More likely than you think (lien direct) |
Il y a plus dans certaines images qui rencontrent l'œil & # 8211;Leurs fa & ccedil apparemment innocents; Ade peut masquer une menace sinistre.
There is more to some images than meets the eye – their seemingly innocent façade can mask a sinister threat. |
Malware
Threat
|
|
★★★
|
|
2024-03-22 12:21:34 |
L'accryptor attaque la montée en puissance en Europe & # 8211;Semaine en sécurité avec Tony Anscombe AceCryptor attacks surge in Europe – Week in security with Tony Anscombe (lien direct) |
La seconde moitié de 2023 a connu une croissance massive des logiciels malveillants bourrés d'accompagnement sur les acanprètes dans la nature, y compris gracieuseté de plusieurs campagnes de spam où l'acceptor a emballé le Rat Rat
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT |
Spam
Malware
|
|
★★
|
|
2024-02-02 13:47:24 |
Grandoreiro Banking Malware a perturbé & # 8211;Semaine en sécurité avec Tony Anscombe Grandoreiro banking malware disrupted – Week in security with Tony Anscombe (lien direct) |
Le cheval de Troie bancaire, qui ciblait principalement le Brésil, le Mexique et l'Espagne, a bloqué l'écran de la victime, les touches enregistrées, les activités de souris et le clavier simulées et affiché de fausses fenêtres.
The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim\'s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows |
Malware
|
|
★★★
|
|
2024-01-10 10:30:00 |
Attaque des copies: comment les fausses applications de messagerie et les mods d'applications pourraient vous mordre Attack of the copycats: How fake messaging apps and app mods could bite you (lien direct) |
WhatsApp, Telegram et Signal Clones and Mods restent un véhicule populaire pour la distribution de logiciels malveillants.Ne soyez pas pris pour un tour.
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don\'t get taken for a ride. |
Malware
|
|
★★★
|
|
2023-11-09 10:30:00 |
Malchanceux Kamran: Android Malware espionnant des résidents de langue ourdou de Gilgit-Baltistan Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan (lien direct) |
Les chercheurs de l'ESET ont découvert Kamran, malveillant auparavant inconnu, qui espionne les lecteurs de langue ourdou de Hunza News
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News |
Malware
Mobile
|
|
★★
|
|
2023-09-22 21:42:55 |
Recherche de menace de pointe de l'ESET à LabsCon & # 8211;Semaine en sécurité avec Tony Anscombe ESET\\'s cutting-edge threat research at LABScon – Week in security with Tony Anscombe (lien direct) |
Cette année, deux chercheurs de logiciels malveillants ESET sont allés sur le laboratoire pour déconstruire des attaques sophistiquées menées par deux groupes APT bien connus
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups |
Malware
Threat
|
|
★★
|
|
2023-09-04 09:30:00 |
Sortir le crochet: 10 étapes à prendre après avoir cliqué sur un lien de phishing Getting off the hook: 10 steps to take after clicking on a phishing link (lien direct) |
Les e-mails de phishing sont une arme de choix pour les criminels déterminés à voler des données personnelles et à planter des logiciels malveillants sur leurs appareils.Le processus de guérison ne se termine pas par le balayage antivirus.
Phishing emails are a weapon of choice for criminals intent on stealing people\'s personal data and planting malware on their devices. The healing process does not end with antivirus scanning. |
Malware
|
|
★★
|
|
2023-08-21 09:31:41 |
Un conte Bard \\'s & # 8211;Comment les faux robots AI essaient d'installer des logiciels malveillants A Bard\\'s Tale – how fake AI bots try to install malware (lien direct) |
La course AI est allumée!Il est facile de perdre la trace des derniers développements et possibilités, et pourtant tout le monde veut voir de première main ce qu'est le battage médiatique.Aperçu pour les cybercriminels!
The AI race is on! It\'s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals! |
Malware
|
|
★★
|
|
2023-07-12 09:30:13 |
ESET Research Podcast: Trouver le mythique Blacklotus Bootkit ESET Research Podcast: Finding the mythical BlackLotus bootkit (lien direct) |
Une histoire sur la façon dont l'analyse d'un supposé de jeu de jeu s'est transformée en la découverte d'une puissante menace UEFI
A story of how analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat
|
Malware
|
|
★★
|
|
2023-05-25 09:30:09 |
Faire l'évasion de l'accryptor et de son opération Shedding light on AceCryptor and its operation (lien direct) |
> Les chercheurs de l'ESET révèlent des détails sur un cryptor répandu, opérant comme un cryptor-en tant que service utilisé par des dizaines de familles de logiciels malveillants
>ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
|
Malware
|
|
★★
|
|
2023-05-16 09:30:00 |
Vous ne vous souciez peut-être pas d'où vous téléchargez un logiciel, mais les logiciels malveillants font You may not care where you download software from, but malware does (lien direct) |
Pourquoi les gens téléchargent-ils encore des fichiers à partir de endroits sommaires et sont-ils compromis en conséquence?
Why do people still download files from sketchy places and get compromised as a result?
|
Malware
|
|
★★
|
|
2023-04-26 09:30:08 |
Evasive Panda Apt Group fournit des logiciels malveillants via des mises à jour pour les logiciels chinois populaires Evasive Panda APT group delivers malware via updates for popular Chinese software (lien direct) |
> ESET Research découvre une campagne du groupe APT connu sous le nom de panda évasif ciblant une ONG internationale en Chine avec des logiciels malveillants livrés via des mises à jour de logiciels chinois populaires
>ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
|
Malware
|
|
★★★
|
|
2023-04-20 09:30:34 |
Linux Malware renforce les liens entre Lazarus et l'attaque de la chaîne d'approvisionnement 3CX Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack (lien direct) |
Les similitudes avec les logiciels malveillants Linux nouvellement découverts utilisés dans l'opération Dreamjob corroborent la théorie selon laquelle le tristement célèbre groupe aligné par la Corée du Nord est derrière l'attaque de la chaîne d'approvisionnement 3CX
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
|
Malware
|
APT 38
|
★★
|
|
2023-03-30 09:30:41 |
Podcast de recherche ESET: une année de combats de roquettes, de soldats et d'essuie-glace en Ukraine [ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine] (lien direct) |
> Les experts de l'ESET partagent leurs idées sur les cyber-éléments de la première année de la guerre en Ukraine et comment un nombre croissant de variantes de logiciels malveillants destructeurs ont tenté de déchirer les systèmes ukrainiens critiques
>ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems
|
Malware
|
|
★★
|
|
2023-02-24 10:30:09 |
A year of wiper attacks in Ukraine (lien direct) |
>ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia's invasion of Ukraine in 2022
|
Malware
|
|
★★
|
|
2023-02-17 13:00:54 |
Search ads abused to spread malware – Week in security with Tony Anscombe (lien direct) |
>Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites
|
Malware
|
|
★★
|
|
2023-01-27 17:45:36 |
SwiftSlicer: New destructive wiper malware strikes Ukraine (lien direct) |
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country
|
Malware
|
|
★★
|
|
2022-10-21 13:15:23 |
APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe (lien direct) |
ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign
|
Malware
|
|
|
|
2022-10-20 09:30:02 |
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware (lien direct) |
>APT-C-50's Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app
|
Malware
|
|
|
|
2022-10-11 09:30:08 |
POLONIUM targets Israel with Creepy malware (lien direct) |
>ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group
|
Malware
|
|
★★★
|
|
2022-07-22 16:15:27 |
macOS malware: myth vs. reality – Week in security with Tony Anscombe (lien direct) |
>ESET research shows yet again that macOS is not immune to malware – and why some users can benefit from Apple's Lockdown Mode
|
Malware
|
|
|
|
2022-07-19 09:30:44 |
I see what you did there: A look at the CloudMensis macOS spyware (lien direct) |
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
|
Malware
|
|
|
|
2022-06-16 09:30:53 |
How Emotet is changing tactics in response to Microsoft\'s tightening of Office macro security (lien direct) |
>Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
|
Malware
|
|
|
|
2022-06-13 09:30:14 |
Industroyer: A cyber‑weapon that brought down a power grid (lien direct) |
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
|
Malware
|
|
|
|
2022-05-20 17:01:27 |
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (lien direct) |
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
|
Malware
|
|
|
|
2022-05-04 13:00:29 |
3 most dangerous types of Android malware (lien direct) |
Here's what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely
|
Malware
|
|
|
|
2022-04-12 09:28:16 |
Industroyer2: Industroyer reloaded (lien direct) |
This ICS-capable malware targets a Ukrainian energy company
|
Malware
|
|
|
|
2022-04-06 09:30:38 |
Fake e‑shops on the prowl for banking credentials using Android malware (lien direct) |
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks
|
Malware
|
|
|
|
2022-03-24 12:30:31 |
Crypto malware in patched wallets targeting Android and iOS devices (lien direct) |
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets
|
Malware
|
|
|
|
2022-03-14 23:00:00 |
CaddyWiper: New wiper malware discovered in Ukraine (lien direct) |
This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations
|
Malware
|
|
|
|
2022-03-03 10:30:15 |
ESET Research Podcast: Ukraine\'s past and present cyberwar (lien direct) |
Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country
|
Malware
|
|
|
|
2022-02-24 09:32:59 |
HermeticWiper: New data‑wiping malware hits Ukraine (lien direct) |
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites
|
Malware
|
|
|
|
2022-01-25 10:30:37 |
Watering hole deploys new macOS malware, DazzleSpy, in Asia (lien direct) |
Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors' Macs
|
Malware
|
|
|
|
2022-01-11 10:30:28 |
Signed kernel drivers – Unguarded gateway to Windows\' core (lien direct) |
ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation
|
Malware
|
|
|
|
2021-12-02 10:30:49 |
Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries (lien direct) |
Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware
|
Malware
|
|
|
|
2021-11-03 10:30:54 |
What\'s it like to work as a malware researcher? 10 questions answered (lien direct) |
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
|
Malware
|
|
|
|
2021-10-15 09:30:19 |
Virus Bulletin: Old malware never dies – it just gets more targeted (lien direct) |
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
|
Malware
|
|
|
|
2021-10-07 09:30:16 |
FontOnLake: Previously unknown malware family targeting Linux (lien direct) |
ESET researchers discover a malware family with tools that show signs they're used in targeted attacks
|
Malware
|
|
|
|
2021-10-06 09:30:56 |
To the moon and hack: Fake SafeMoon app drops malware to spy on you (lien direct) |
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
|
Malware
|
|
|
|
2021-08-06 12:59:27 |
Anatomy of native IIS malware (lien direct) |
ESET researchers publish a white paper putting IIS web server threats under the microscope
|
Malware
|
|
|
|
2021-05-25 16:59:09 |
Apple fixes macOS zero‑day bug that let malware take secret screenshots (lien direct) |
You would do well to update to macOS Big Sur 11.4 post-haste
|
Malware
|
|
|
|
2021-05-17 13:00:23 |
Take action now – FluBot malware may be on its way (lien direct) |
Why FluBot is a major threat for Android users, how to avoid falling victim, and how to get rid of the malware if your device has already been compromised
|
Malware
Threat
|
|
|
|
2021-05-03 16:39:51 |
INTERPOL aims to deal a blow to digital piracy (lien direct) |
The agency's new initiative will also warn about the high cost of the free lunch – the increased risk of malware exposure
|
Malware
|
|
|
|
2021-04-20 15:45:32 |
WhatsApp Pink: Watch out for this fake update (lien direct) |
The malware sends automated replies to messages on WhatsApp and other major chat apps
|
Malware
|
|
|
|
2021-03-18 14:47:20 |
Beware Android trojan posing as Clubhouse app (lien direct) |
The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication
|
Malware
|
|
|