__mat__
@matthieu_faou
Malware researcher at @ESETResearch
@[email protected]
ID: 708399640375398400
https://www.welivesecurity.com/en/about-eset-research/ 11-03-2016 21:10:10
811 Tweet
2,2K Takipçi
391 Takip Edilen
We are looking for a strategic threat intel analyst to join ESET Research. Interested in cyber-espionage and geopolitics? Apply! ca.linkedin.com/jobs/view/anal…
#ESETresearch dives into #CosmicBeetle’s activities over the last year, including its shift to custom ransomware deployment and the threat actor’s curious relationship with #LockBit and #RansomHub Jakub Souček welivesecurity.com/en/eset-resear… 1/7
#ESETresearch has discovered a new China-aligned APT group, which we named #CeranaKeeper, conducting massive data exfiltration in Southeast Asia. Today, we are sharing our findings about CeranaKeeper at the Virus Bulletin #VB2024 conference in Dublin. welivesecurity.com/en/eset-resear… 1/6
The winner of the 2024 Péter Szőr Award for the best technical security research is #ESETresearch and Marc-Etienne M.Léveillé for "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain". More: welivesecurity.com/en/eset-resear… #VB2024
#ESETresearch analyzed CloudScout, a previously undocumented toolset used by Evasive Panda against a government entity and a religious institution in Taiwan. Deployed by #MgBot, it steals browser cookies to access and retrieve data from cloud services. welivesecurity.com/en/eset-resear… 1/4
#ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confidence to #Gelsemium. This 🇨🇳 China-aligned APT group , active since 2014, has not previously been publicly reported to use Linux malware. welivesecurity.com/en/eset-resear…
#ESETresearch discovered an #exploit targeting Firefox and Windows zero days, used in the wild by Russia-aligned #RomCom. Browsing a specially crafted web page runs arbitrary code with the privileges of the user, compromising the PC. 🏴☠️ & R.Dumont welivesecurity.com/en/eset-resear… 1/7
#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. welivesecurity.com/en/eset-resear… 1/5
#ESETresearch discovered and reported to CERT/CC a vulnerability that allows bypassing UEFI Secure Boot on most UEFI-based systems. This vulnerability, #CVE-2024-7344, was found in a UEFI app signed by Microsoft’s 3rd-party UEFI certificate. Martin Smolar welivesecurity.com/en/eset-resear… 1/4