Tuesday, April 29, 2025
HomeCyber Security NewsHackers Mimic as ESET to Deliver Wiper Malware

Hackers Mimic as ESET to Deliver Wiper Malware

Published on

SIEM as a Service

Follow Us on Google News

Hackers impersonated the cybersecurity firm ESET to distribute destructive wiper malware. The campaign, which began on October 8, 2024, utilized phishing emails that appeared to originate from ESET’s legitimate domain.

The malicious emails, purportedly from “ESET’s Advanced Threat Defense Team,” warned recipients that state-backed attackers were targeting their devices.

The emails offered a download link for a fictitious “ESET Unleashed” program to combat this alleged threat.

- Advertisement - Google News
ESET Warned Recipients (source: DoublePulsar)
ESET Warned Recipients (source: DoublePulsar)

Upon clicking the link, victims were directed to a ZIP file hosted on ESET Israel’s legitimate domain. The archive contained several legitimate ESET DLL files and a malicious Setup.exe, identified as a wiper malware.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

According to the DoublePulsar report, Security researcher Kevin Beaumont, who analyzed the attack, noted that the malware required a physical PC to activate and exhibited evasion techniques.

The wiper was also connected to a legitimate Israeli news organization’s website, possibly to avoid detection.

ESET acknowledged the incident, stating it affected their partner company in Israel, Comsecure.

The company emphasized that their systems were not compromised and that the malicious email campaign was blocked within ten minutes.

ESET Acknowledged
ESET Acknowledged (Source: Doublepulsar)

The attack targeted cybersecurity personnel within Israeli organizations, suggesting a strategic attempt to disrupt the country’s digital defense.

While the perpetrators remain unidentified, the tactics employed bear similarities to those used by pro-Palestinian groups like Handala, which has been linked to sophisticated attacks against Israeli targets.

It underscores the importance of verifying the authenticity of security-related communications, even when they appear to come from trusted sources.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...