Gelsemium: When threat actors go gardening

Gelsemium: When threat actors go gardening

ESET researchers shed light on new campaigns from the quiet Gelsemium group In mid-2020, ESET researchers started to analyze multiple campaigns, later attributed to the Gelsemium group, and tracked down the earliest version of the malware going back to 2014. Victims of these campaigns are located in East Asia as well as the Middle East…
5 common scams targeting teens – and how to stay safe

5 common scams targeting teens – and how to stay safe

From knock-off designer products to too-good-to-be-true job offers, here are five common schemes fraudsters use to trick teenagers out of their money and sensitive data Most teenagers, while not as impressionable as small children, can still be subjected to various external influences. If you’re one of them, you probably haven’t experienced the many ups and…
ESET Threat Report T1 2021

ESET Threat Report T1 2021

A view of the T1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts During the first four months of this year, the COVID-19 pandemic was still the number one news topic around the world; however, it became notably less prominent in the threat landscape.…
Zero‑day in popular WordPress plugin exploited to take over websites

Zero‑day in popular WordPress plugin exploited to take over websites

Websites using Fancy Product Designer are susceptible to remote code execution attacks even if the plugin is deactivated Cybercriminals have been actively exploiting a zero-day vulnerability in Fancy Product Designer, a WordPress plugin used by more than 17,000 websites, according to a blog post by Defiant, which makes Wordfence security plugins for the web publishing platform. Attackers…
Hacking space: How to pwn a satellite

Hacking space: How to pwn a satellite

Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space Getting root on something floating above our planet (or any other for that matter) would seem like a new form of hacking Holy Grail. Don’t worry though, someone’s already working on it – believe it or…
Take action now – FluBot malware may be on its way

Take action now – FluBot malware may be on its way

Why FluBot is a major threat for Android users, how to avoid falling victim, and how to get rid of the malware if your device has already been compromised Android malware known as FluBot is continuing to cause mayhem across some European countries, and there is speculation that the threat actors behind it may decide…
Scams target families of missing persons, FBI warns

Scams target families of missing persons, FBI warns

Con artists use social media to find and target victims for various nefarious ends, including to extort relatives of missing persons The United States’ Federal Bureau of Investigation (FBI) has issued a warning about the threat posed by scam artists who are attempting to extort families using information about missing family members on social media. The…
Colonial Pipeline attack: Hacking the physical world

Colonial Pipeline attack: Hacking the physical world

The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals While detractors have argued that threats against physical infrastructure are overstated and largely theoretical, the growing list of organizations that have been successfully attacked suggests otherwise. And now the media is…
Android 12 will give you more control over how much data you share with apps

Android 12 will give you more control over how much data you share with apps

An all-new privacy dashboard and better location, microphone and camera controls are all aimed at curbing apps’ data-slurping habits With the upcoming official release of Android 12, Google has outlined a range of security and privacy improvements that users can expect to experience once the new version of the mobile operating system is launched. Android’s new…
Rom‑con: How romance fraud targets older people and how to avoid it

Rom‑con: How romance fraud targets older people and how to avoid it

Online dating scams often follow the same script – here’s what senior citizens should watch out for and how their younger relatives can help them avoid falling victim Recently, we looked at how older people can avoid falling victim to various flavors of online scams. This time round, we’ll examine the costliest type of fraud…