Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profileg
Zuzana Hromcova

@zuzana_hromcova

Malware Researcher @ESET

ID:986711115769016320

linkhttps://www.welivesecurity.com/en/ calendar_today18-04-2018 21:00:37

33 Tweets

1,0K Followers

71 Following

ESET Research(@ESETresearch) 's Twitter Profile Photo

Breaking. discovered a new data wiper malware used in Ukraine today. ESET telemetry shows that it was installed on hundreds of machines in the country. This follows the DDoS attacks against several Ukrainian websites earlier today 1/n

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

New blogpost discusses vulnerabilities among kernel drivers, provides several case studies of malware utilizing such drivers, shows examples of discovered CVEs, and outlines mitigation techniques. welivesecurity.com/2022/01/11/sig… 1/5

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

Tired of reading? From now on, you can switch to the audio and listen to ESET Research via our new ESET Research podcast. Find it on Spotify, Apple Podcasts, Google Podcasts as well as on PodBean. esetresearch.podbean.com 1/3

Tired of reading? From now on, you can switch to the audio and listen to @ESETresearch via our new ESET Research podcast. Find it on Spotify, Apple Podcasts, Google Podcasts as well as on PodBean. esetresearch.podbean.com 1/3
account_circle
Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profile Photo

This is an interesting read, especially for someone like me who hasn't 'lived through' Flame, Gauss, USBThief etc.
Nice to see all of the air-gap malware frameworks side-by-side and learn how they operate.

account_circle
Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profile Photo

I highly recommend this presentation about watering-hole attacks at next week. I'm quite picky about conference talks, but I've seen __mat__ rehearse this one and LOVED it. You can still register for the online version a few more hours today, so go for it! 😉

account_circle
Donncha Ó Cearbhaill(@DonnchaC) 's Twitter Profile Photo

NEW RESEARCH 📢📢: Amnesty Tech has published a investigation revealing a hacker-for-hire style campaign targeting a prominent activist from Togo in West Africa. Lets dive into this curious case.. THREAD
amnesty.org/en/latest/news…

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

has discovered a new undocumented UEFI bootkit, , persisting as a patched Windows Boot Manager (bootmgfw.efi) on the Efi System Partition (ESP). welivesecurity.com/2021/10/05/uef… 1/5 Martin Smolar Anton Cherepanov

account_circle
Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profile Photo

Proud to share this research paper which concludes my months of reversing scores of malicious IIS extensions 🔎🥳 Read on if you are interested in server-side threats 👇👇👇

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

Don’t miss presentation “The Group: an analysis of their latest activities” at . See you virtually on Thursday at 13:50 (UTC+1, Paris Time). Mathieu Tartare

botconf.eu/botconf-2020/s…

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

Recently discovered by Martin Smolar, modular is hungry for data, targeting sensitive information stored in management software suite used by hundreds of thousands of bars, restaurants and hotels worldwide. welivesecurity.com/2020/11/12/hun… 1/4

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

Today, the US DOJ charged six alleged members of the Team / justice.gov/opa/pr/six-rus…
has cover extensively the group's activities in the past years with 9 different publications. 1/9

account_circle
Mark(@_marklech_) 's Twitter Profile Photo

[1/n] I'm happy to share a significant research done by Igor Kuznetsov and myself. What we found was a UEFI rootkit in the wild, customized from Hacking Team's leaked Vector-EDK code. That would be the second time we see something like this publicly
securelist.com/mosaicregresso…

account_circle
Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profile Photo

Catching up on all the on-demand sessions, I found this interesting piece: vblocalhost.com/conference/pre….
ArieO and Alexey, great job uncovering the GuLoader background, and an entertaining presentation too! 👏💪

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

analyzed various post-compromise tools used by the group to steal sensitive documents and spread in their victim’s networks including custom MS Outlook VBA projects and macro injection tools welivesecurity.com/2020/06/11/gam… Jean-Ian Boutin 1/4

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

has discovered a new cyber-espionage framework dubbed Ramsay, tailored for stealing Word documents from air-gapped networks. welivesecurity.com/2020/05/13/ram… ulexec 1/7

account_circle
Zuzana Hromcova(@zuzana_hromcova) 's Twitter Profile Photo

VERY interesting talk BlueHat IL on evading using ! Also with impressive results from real-world tests. Well worth checking this research! geneva.cs.umd.edu

VERY interesting talk @BlueHatIL on evading #censorship using #AI! Also with impressive results from real-world tests. Well worth checking this research! geneva.cs.umd.edu
account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

How can be leveraged for malware hunting? Peter Kálnai & Michal Poslusny from discussed this mysterious artifact at the conference avar2019.org/agenda/day-1/r…

How can #Richheaders be leveraged for malware hunting? @pkalnai & Michal Poslusny from #ESETresearch discussed this mysterious artifact at the #AVAR2019 #cybersecurity conference avar2019.org/agenda/day-1/r…
account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

Starting with the telemetry data gathered by ESET’s scanner, machine learning specialists and malware researchers devised a method to spot rare UEFI/based .
welivesecurity.com/2019/10/08/nee…

account_circle