SCrow357's profile picture. Malware Researcher at ESET

Jakub Souček

@SCrow357

Malware Researcher at ESET

My teammates' insight into the previously undisclosed tooling, MDeployer and MS4Killer, used by #Embargo, one of the newly emerged RaaS #ransomware groups.

#ESETresearch analyzed new Rust-based tools, MDeployer and MS4Killer, used for deploying #Embargo ransomware and discovered when investigating attacks targeting US companies in July 2024. welivesecurity.com/en/eset-resear… 1/6



Jakub Souček reposted

#ESETresearch You may have heard about #Grandoreiro resurrection after its disruption in January. This is not entirely true. In short: the disrupted Grandoreiro is different from the currently active Grandoreiro strain. Read further to learn more. 1/9


Jakub Souček reposted

Following up, Spain’s @policia stated that over the course of 2 years they arrested a total of 133 mules in 🇪🇸 tied to #Grandoreiro. Their operation is directly linked to the one by Brazil’s @policiafederal where #ESETresearch played a crucial role. policia.es/_es/comunicaci… 1/4


Excellent results of a great effort of a great team!

#ESETresearch aided in an operation to disrupt #Grandoreiro, a banking trojan targeting the general public in 🇧🇷, 🇲🇽, 🇪🇸 and 🇦🇷. ESET provided technical analysis, stats, and C&C addresses. welivesecurity.com/en/eset-resear… 1/4

ESETresearch's tweet image. #ESETresearch aided in an operation to disrupt #Grandoreiro, a banking trojan targeting the general public in 🇧🇷, 🇲🇽, 🇪🇸 and 🇦🇷. ESET provided technical analysis, stats, and C&C addresses. welivesecurity.com/en/eset-resear… 1/4


Jakub Souček reposted

#ESETresearch discovered a toolkit that we have named #Telekopye. This malware is implemented as a Telegram bot that, when activated, provides easy-to-navigate menus that make scamming easier. 1/4 welivesecurity.com/en/eset-resear…

ESETresearch's tweet image. #ESETresearch discovered a toolkit that we have named #Telekopye. This malware is implemented as a Telegram bot that, when activated, provides easy-to-navigate menus that make scamming easier. 1/4
welivesecurity.com/en/eset-resear…

Jakub Souček reposted

#ESETResearch is hiring malware researchers for our 🇨🇦 🇨🇿 🇸🇰 offices. If you’d like to track some of the most impactful APTs/cybercrime campaigns, don’t wait and apply here 👇 🇨🇦: jobs.eset.com/int/job-offer/… 🇨🇿: eset.com/cz/o-nas/karie… 🇸🇰: jobs.eset.com/int/job-offer/… #infosecjobs 1/4


Jakub Souček reposted

#BREAKING #Sandworm continues attacks in Ukraine 🇺🇦. #ESETresearch found an evolution of a malware loader used during the #Industroyer2 attacks. This updated piece of the puzzle is malware @_CERT_UA calls #ArguePatch. ArguePatch was used to launch #CaddyWiper. #WarInUkraine 1/6

ESETresearch's tweet image. #BREAKING #Sandworm continues attacks in Ukraine 🇺🇦. #ESETresearch found an evolution of a malware loader used during the #Industroyer2 attacks. This updated piece of the puzzle is malware 
@_CERT_UA calls #ArguePatch. ArguePatch was used to launch #CaddyWiper.  #WarInUkraine 1/6

Jakub Souček reposted

#ESETresearch participated in the action to disrupt the #Zloader botnets along with many partners. Our historical telemetry shows Zloader being distributed mostly in North America and Europe. welivesecurity.com/2022/04/13/ese… @0xE9FBFFFFFF @jiboutin 1/3

ESETresearch's tweet image. #ESETresearch participated in the action to disrupt the #Zloader botnets along with many partners. Our historical telemetry shows Zloader being distributed mostly in North America and Europe. welivesecurity.com/2022/04/13/ese… @0xE9FBFFFFFF @jiboutin 1/3

Jakub Souček reposted

🇺🇦 #BREAKING #ESETresearch continues to investigate the #HermeticWiper incident. We uncovered a worm component #HermeticWizard, used to spread the wiper in local networks. We also discovered another wiper, called #IsaacWiper deployed in #Ukraine. welivesecurity.com/2022/03/01/isa… 1/4

ESETresearch's tweet image. 🇺🇦 #BREAKING #ESETresearch continues to investigate the #HermeticWiper incident. We uncovered a worm component #HermeticWizard, used to spread the wiper in local networks. We also discovered another wiper, called #IsaacWiper deployed in #Ukraine. welivesecurity.com/2022/03/01/isa… 1/4

Jakub Souček reposted

Breaking. #ESETResearch discovered a new data wiper malware used in Ukraine today. ESET telemetry shows that it was installed on hundreds of machines in the country. This follows the DDoS attacks against several Ukrainian websites earlier today 1/n


Jakub Souček reposted

#ESETresearch identified a new non-prevalent variant of #Grandoreiro. The two most crucial changes are string table obfuscation and new targets from LATAM and EU 🇪🇺 countries, US 🇺🇸, Canada 🇨🇦, Australia 🇦🇺 and United Arab Emirates 🇦🇪. The DGA is slightly changed as well. 1/3

ESETresearch's tweet image. #ESETresearch identified a new non-prevalent variant of #Grandoreiro. The two most crucial changes are string table obfuscation and new targets from LATAM and EU 🇪🇺 countries, US 🇺🇸, Canada 🇨🇦, Australia 🇦🇺 and United Arab Emirates 🇦🇪. The DGA is slightly changed as well. 1/3

Jakub Souček reposted

#ESETresearch concludes its LATAM banking trojan series. We look at how the scene changed in the last 2y, briefly describe Lokorrito, Krachulka and Zumanek, which became dormant before getting their own piece & hypothesize what the future might bring. welivesecurity.com/2021/12/15/dir… 1/3

ESETresearch's tweet image. #ESETresearch concludes its LATAM banking trojan series. We look at how the scene changed in the last 2y, briefly describe Lokorrito, Krachulka and Zumanek, which became dormant before getting their own piece & hypothesize what the future might bring. welivesecurity.com/2021/12/15/dir… 1/3
ESETresearch's tweet image. #ESETresearch concludes its LATAM banking trojan series. We look at how the scene changed in the last 2y, briefly describe Lokorrito, Krachulka and Zumanek, which became dormant before getting their own piece & hypothesize what the future might bring. welivesecurity.com/2021/12/15/dir… 1/3

Jakub Souček reposted

#ESETresearch continues its series about Latin American banking trojans, this time featuring #Numando, a malware family targeting almost exclusively Brazil 🇧🇷 since at least 2018. @RoboSuman welivesecurity.com/2021/09/17/num… 1/3


Jakub Souček reposted

16 people arrested in 🇪🇸 Spain due to connections to #Mekotio and #Grandoreiro, two LATAM banking trojans operating in Europe since 2020. interior.gob.es/prensa/noticia… #ESETresearch @SCrow357 1/5


Jakub Souček reposted

#ESETresearch responded to ransomware deployed as supply-chain attack against #Kaseya VSA users attributed to #REvil beginning Friday afternoon EDT (US)/evening CEST (Europe). Detection was added for Win32/Filecoder.Sodinokibi.N on Friday shortly after.welivesecurity.com/2021/07/03/kas… 1/3

ESETresearch's tweet image. #ESETresearch responded to ransomware deployed as supply-chain attack against #Kaseya VSA users attributed to #REvil beginning Friday afternoon EDT (US)/evening CEST (Europe). Detection was added for Win32/Filecoder.Sodinokibi.N on Friday shortly after.welivesecurity.com/2021/07/03/kas… 1/3
ESETresearch's tweet image. #ESETresearch responded to ransomware deployed as supply-chain attack against #Kaseya VSA users attributed to #REvil beginning Friday afternoon EDT (US)/evening CEST (Europe). Detection was added for Win32/Filecoder.Sodinokibi.N on Friday shortly after.welivesecurity.com/2021/07/03/kas… 1/3

Jakub Souček reposted

#ESETresearch telemetry shows majority of reports of Win32/Filecoder.Sodinokibi.N (#REvil) coming from 🇬🇧UK, 🇨🇦CA, 🇿🇦ZA, 🇨🇴CO and 🇩🇪 DE, followed by 🇳🇿NZ, 🇺🇸US, 🇦🇷AR, 🇮🇩 ID, 🇲🇽MX and 🇪🇸ES in decreasing order. @goretsky 1/2

ESETresearch's tweet image. #ESETresearch telemetry shows majority of reports of Win32/Filecoder.Sodinokibi.N (#REvil) coming from 🇬🇧UK, 🇨🇦CA, 🇿🇦ZA, 🇨🇴CO and 🇩🇪 DE, followed by 🇳🇿NZ, 🇺🇸US, 🇦🇷AR, 🇮🇩 ID, 🇲🇽MX and 🇪🇸ES in decreasing order. @goretsky 1/2

Jakub Souček reposted

#ESETresearch discovered a campaign distributing #Grandoreiro banking trojan targeting the US 🇺🇸. This is the first campaign of a LATAM banking trojan outside of LATAM and Europe we have observed. It is spreading via malicious ads leading to https://spotifyannounce[.]com. 1/4


Jakub Souček reposted

#ESETresearch continues its series about Latin American banking trojans, this time focusing on #Ousaban, a malware family targeting Brazil 🇧🇷 since at least 2018. @RoboSuman welivesecurity.com/2021/05/05/ous… 1/4


Jakub Souček reposted

A massive spam campaign distributing the #Ousaban banking trojan hit Brazil recently. Counting the files inside the ZIP archives included in its distribution chain, we get an unbelievable 143 files, most of them decoys. #ESETresearch will publish details about #Ousaban soon. 1/5

ESETresearch's tweet image. A massive spam campaign distributing the #Ousaban banking trojan hit Brazil recently. Counting the files inside the ZIP archives included in its distribution chain, we get an unbelievable 143 files, most of them decoys. #ESETresearch will publish details about #Ousaban soon. 1/5

Jakub Souček reposted

New #Casbaneiro campaign targets Mexico🇲🇽. Interestingly,foreground window checking is done by the third PowerShell downloader instead of the final payload. Only when the victim visits a targeted banking website, #Casbaneiro is downloaded and executed.@RoboSuman #ESETresearch 1/5

ESETresearch's tweet image. New #Casbaneiro campaign targets Mexico🇲🇽. Interestingly,foreground window checking is done by the third PowerShell downloader instead of the final payload. Only when the victim visits a targeted banking website, #Casbaneiro is downloaded and executed.@RoboSuman #ESETresearch 1/5
ESETresearch's tweet image. New #Casbaneiro campaign targets Mexico🇲🇽. Interestingly,foreground window checking is done by the third PowerShell downloader instead of the final payload. Only when the victim visits a targeted banking website, #Casbaneiro is downloaded and executed.@RoboSuman #ESETresearch 1/5
ESETresearch's tweet image. New #Casbaneiro campaign targets Mexico🇲🇽. Interestingly,foreground window checking is done by the third PowerShell downloader instead of the final payload. Only when the victim visits a targeted banking website, #Casbaneiro is downloaded and executed.@RoboSuman #ESETresearch 1/5
ESETresearch's tweet image. New #Casbaneiro campaign targets Mexico🇲🇽. Interestingly,foreground window checking is done by the third PowerShell downloader instead of the final payload. Only when the victim visits a targeted banking website, #Casbaneiro is downloaded and executed.@RoboSuman #ESETresearch 1/5

Loading...

Something went wrong.


Something went wrong.