Cyber Security News

Hackers Mimic as ESET to Deliver Wiper Malware

Hackers impersonated the cybersecurity firm ESET to distribute destructive wiper malware. The campaign, which began on October 8, 2024, utilized phishing emails that appeared to originate from ESET’s legitimate domain.

The malicious emails, purportedly from “ESET’s Advanced Threat Defense Team,” warned recipients that state-backed attackers were targeting their devices.

The emails offered a download link for a fictitious “ESET Unleashed” program to combat this alleged threat.

ESET Warned Recipients (source: DoublePulsar)

Upon clicking the link, victims were directed to a ZIP file hosted on ESET Israel’s legitimate domain. The archive contained several legitimate ESET DLL files and a malicious Setup.exe, identified as a wiper malware.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

According to the DoublePulsar report, Security researcher Kevin Beaumont, who analyzed the attack, noted that the malware required a physical PC to activate and exhibited evasion techniques.

The wiper was also connected to a legitimate Israeli news organization’s website, possibly to avoid detection.

ESET acknowledged the incident, stating it affected their partner company in Israel, Comsecure.

The company emphasized that their systems were not compromised and that the malicious email campaign was blocked within ten minutes.

ESET Acknowledged (Source: Doublepulsar)

The attack targeted cybersecurity personnel within Israeli organizations, suggesting a strategic attempt to disrupt the country’s digital defense.

While the perpetrators remain unidentified, the tactics employed bear similarities to those used by pro-Palestinian groups like Handala, which has been linked to sophisticated attacks against Israeli targets.

It underscores the importance of verifying the authenticity of security-related communications, even when they appear to come from trusted sources.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Abuse Windows .RDP Files to Launch Unauthorized Remote Desktop Sessions

The Google Threat Intelligence Group (GTIG) has unearthed a novel phishing campaign leveraging Windows Remote…

50 seconds ago

Linux 6.15-rc1 Released: Better Drivers, Faster Performance

The Linux kernel community has witnessed another milestone with the release of Linux 6.15-rc1, the…

9 minutes ago

Google Patches Actively Exploited Android 0-Day Vulnerability

Google has issued critical security updates to address a recently discovered zero-day vulnerability actively exploited…

29 minutes ago

Kellogg’s Servers Breached, Hackers Steal Sensitive Data

WK Kellogg Co., one of the world's leading cereal and snack manufacturers, has fallen victim…

1 hour ago

Xanthorox AI: New Automated Hacking Tool Surfaces on Hacker Forums

A new malicious AI tool, Xanthorox AI, has emerged on underground hacker forums. Dubbed the "Killer…

2 hours ago

Apollo Router Vulnerability Enables Resource Exhaustion via Optimization Bypass

A critical vulnerability (CVE-2025-32032) has been identified in Apollo Router, a widely used GraphQL federation…

2 hours ago