ESET Research's Avatar

ESET Research

@esetresearch.bsky.social

Security research and breaking news straight from ESET Research Labs. welivesecurity.com/research/

1,135 Followers  |  13 Following  |  407 Posts  |  Joined: 07.02.2024
Posts Following

Posts by ESET Research (@esetresearch.bsky.social)

IoCs available in our GitHub repo: github.com/eset/malware... 6/6

19.02.2026 10:37 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The analyzed samples are available on VirusTotal and seem to be used in a real campaign targeting users in πŸ‡¦πŸ‡·, though we can’t rule out them being a part of a proof-of-concept. At the same time, the analyzed malware samples point toward PromptSpy being developed in a Chinese-speaking environment. 5/6

19.02.2026 10:37 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

PromptSpy abuses Accessibility Services to deploy a #VNC module on victim devices, so attackers can see the screen and perform actions remotely, as well as block the victim from manually uninstalling the malicious app (which uses invisible overlays, here marked in red). 4/6

19.02.2026 10:37 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Since Android malware often relies on hardcoded UI navigation, employing generative AI enables the threat actors to adapt to more or less any device, layout, or OS version, which can greatly increase the number of potential victims. 3/6

19.02.2026 10:37 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Gemini is used to analyze the current screen and provide PromptSpy with step-by-step instructions to ensure that the malicious app remains pinned in the recent apps list, preventing it from being easily swiped away or killed by the system. 2/6

19.02.2026 10:37 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

#BREAKING #ESETresearch has discovered the first known Android malware to use generative AI in its execution flow; we have named it #PromptSpy. The malware abuses Google’s #Gemini to achieve persistence on the compromised device. www.welivesecurity.com/en/eset-rese... 1/6

19.02.2026 10:37 β€” πŸ‘ 10    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0

IoCs available in our GitHub repo: github.com/eset/malware... 5/5

30.01.2026 10:29 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

ZOV is destructive malware that we detected being deployed against a financial institution in Ukraine in Nov 2025. When the ZOV wiper runs, it destroys files by overwriting them with the string ZOV changes the desktop wallpaper. Z, O, and V are symbols used by the Russian military in Ukraine. 4/5

30.01.2026 10:29 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

#ESETresearch attributes the attack to the Russia‑aligned #Sandworm with medium confidence, based on strong overlaps in behavior & TTPs with multiple earlier Sandworm attacks. Specifically, DynoWiper operates in a broadly similar fashion to ZOV wiper attributed to Sandworm with high confidence. 3/5

30.01.2026 10:29 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@CERT_Polska_en did an excellent job investigating the incident and published a detailed analysis in a report:
cert.pl/en/posts/202... 2/5

30.01.2026 10:29 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

#BREAKING #ESETresearch provides technical details on #DynoWiper, a data‑wiping malware used in a data‑destruction incident on December 29, 2025, affecting a company in Poland’s energy sector. www.welivesecurity.com/en/eset-rese... 1/5

30.01.2026 10:29 β€” πŸ‘ 11    πŸ” 9    πŸ’¬ 1    πŸ“Œ 1
Preview
malware-ioc/ghostchat at master Β· eset/malware-ioc Indicators of Compromises (IOC) of our various investigations - eset/malware-ioc

IoCs available in our GitHub repo: github.com/eset/malware...
Read the full analysis on WeLiveSecurity: www.welivesecurity.com/en/eset-rese... 9/9

28.01.2026 10:49 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The operation blends mobile spyware, social engineering, and desktop exploitation, targeting users in πŸ‡΅πŸ‡° Pakistan. Despite its specific targeting, there are insufficient similarities in TTPs to attribute this campaign to any known threat actor at this point. 8/9

28.01.2026 10:49 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

The same domain (buildthenations[.]info), also used to impersonate the Ministry of Defence website, mimics Pakistan’s Emergency Response Team and delivers a payload via #ClickFix, targeting desktop devices. 7/9

28.01.2026 10:49 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

The GhostChat campaign is part of a broader, multiplatform, spy operation. In related activity, victims are lured into scanning QR codes on websites impersonating Pakistan’s Ministry of Defence, thereby giving the threat actors access to private #WhatsApp communications. 6/9

28.01.2026 10:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Upon installation, GhostChat immediately requests permissions and begins exfiltrating data – even before login. It continuously monitors new images, scans for documents every five minutes, and exfiltrates sensitive information from the device. 5/9

28.01.2026 10:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

This impression of personalization and exclusive access is rarely seen in mobile threat campaigns and suggests a highly targeted social engineering effort. Under its faΓ§ade lies the true purpose of the app: data exfiltration. 4/9

28.01.2026 10:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

The credentials and codes are not processed by any server and are hardcoded in the app, implying that they are probably distributed along with the app by the threat actor. 3/9

28.01.2026 10:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

The spyware used in the campaign, which we named #GhostChat, uses the icon of a legitimate chat app. After installation from unknown sources, login credentials and unlock codes are required to access the app and individual chat profiles, respectively. 2/9

28.01.2026 10:49 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation.

#ESETresearch has uncovered a new #Android spyware campaign using novel romance scam tactics to target individuals in πŸ‡΅πŸ‡° Pakistan, with an added social engineering element previously unseen in similar schemes. www.welivesecurity.com/en/eset-rese... 1/9

28.01.2026 10:49 β€” πŸ‘ 9    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0

We continue to investigate the incident and broader implications. As new evidence or links to additional Sandworm activity emerge, we will share further updates to help defenders protect critical sectors. 5/5

23.01.2026 16:30 β€” πŸ‘ 8    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

#ESET detects DynoWiper as Win32/KillFiles.NMO. Customers of our private ESET Threat Intelligence APT reports have already received additional technical details and IOCs to support rapid detection and response. IoC: 4EC3C90846AF6B79EE1A5188EEFA3FD21F6D4CF6 4/5

23.01.2026 16:30 β€” πŸ‘ 10    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0

The attack struck during peak winter and the 10‑year anniversary of Sandworm’s 2015 attack on πŸ‡ΊπŸ‡¦ Ukraine’s power grid - the first malware-driven blackout, leaving ~230,000 people without electricity. 3/5

23.01.2026 16:30 β€” πŸ‘ 7    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

#ESETresearch attributes the attack to the Russia‑aligned #Sandworm APT group with medium confidence, based on strong overlaps in behavior and TTPs with multiple earlier Sandworm-linked wiper operations investigated by our team. 2/5

23.01.2026 16:30 β€” πŸ‘ 8    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5

23.01.2026 16:30 β€” πŸ‘ 35    πŸ” 30    πŸ’¬ 1    πŸ“Œ 5
Post image

#ESETresearch’s Lukas Stefanko will speak at Ransomware Resilience 2026 on Mon, Jan 19 in Kuala Lumpur at 4pm local time! Discover how Android NFC threats evolved to enable unauthorized ATM withdrawals. Learn about NGate - first Android malware to execute NFC relay attack for remote ATM cash-outs.

16.01.2026 12:37 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Read more about the evolution of NFC threat landscape in the latest #ESETThreatReport web-assets.esetstatic.com/wls/en/paper... 6/6

15.01.2026 09:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Attackers remain faithful to tried-and-tested methods like #phishing calls and messages, while increasingly relying on psychological manipulation and #social engineering rather than exploiting just the technological aspect of NFC. 5/6

15.01.2026 09:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

And #RatOn combines RAT-like features with relay functionality, showcasing the determination of threat actors to evolve the methods of compromise. It’s distributed via fraudulent ads and apps, with the language targeting Czech and Slovak users. 4/6

15.01.2026 09:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

An NGate-based malware adapted for Brazil, #PhantomCard, targets banking clients via fake #Android apps that claim to improve security and privacy, distributed on pages featuring fabricated positive reviews. 3/6

15.01.2026 09:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0