{"id":12512,"date":"2020-09-27T14:32:18","date_gmt":"2020-09-27T10:32:18","guid":{"rendered":"https:\/\/techxmedia.com\/?p=12512"},"modified":"2025-04-18T00:21:31","modified_gmt":"2025-04-17T20:21:31","slug":"eset-highlight-cyber-espionage-discoveries-at-vb2020","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/eset-highlight-cyber-espionage-discoveries-at-vb2020\/","title":{"rendered":"ESET will highlight new cyber espionage discoveries at VB2020"},"content":{"rendered":"\n<p><a href=\"https:\/\/techxmedia.com\/tag\/eset\/\">ESET<\/a>\u00a0will highlight its top research for 2020 during the VB2020 localhost conference. This year, the Virus Bulletin international conference will go entirely online, thus the name change. The virtual event will take place over three days from September 30 to October 2. ESET researchers will hold four presentations and participate in one panel debate. Two notable research presentations, which have not been published before, are the discovery of knowledge sharing among Latin American financial cyber criminals and a previously undisclosed cyber espionage operation targeting several governments in Eastern Europe, the Balkans and Russia. The conference is free this year, with <a href=\"https:\/\/vblocalhost.com\/registration\/\">registration required<\/a>.<\/p>\n\n\n\n<p>First to present will be Jakub Sou\u010dek and Martin Jirkal, from ESET\u2019s R&amp;D center in Prague, about <a href=\"https:\/\/vblocalhost.com\/presentations\/latam-financial-cybercrime-competitors-in-crime-sharing-ttps\/\">Latin American financial cybercriminals<\/a> &#8211; competitors in crime who benefit from sharing tactics, techniques and procedures. Even though knowledge sharing among cybercriminals is not unusual, seeing so many examples of it in region-specific <a href=\"https:\/\/techxmedia.com\/tag\/malware\/\">malware<\/a> families with the same focus caught the attention of <a href=\"https:\/\/techxmedia.com\/tag\/eset\/\">ESET <\/a>researchers. The presentation will take place on October 1, 19:45-20:15 CEST.<\/p>\n\n\n\n<p> The second presentation will cover a discovery ESET researchers made earlier this year: a previously undisclosed cyber espionage operation targeting several governments in Eastern Europe, the Balkans and Russia. The presentation, headlined \u201c<a href=\"https:\/\/vblocalhost.com\/presentations\/xdspy-stealing-government-secrets-since-2011\/\">XDSpy: Stealing government secrets since 2011<\/a>,\u201d will be held by <a href=\"https:\/\/techxmedia.com\/tag\/eset\/\">ESET <\/a>Montreal researchers Matthieu\u00a0Faou and Francis Labelle on October 2, 20:15-20:45 CEST.<\/p>\n\n\n\n<p>The final live online talk, based on a <a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/18\/digging-up-invisimole-hidden-arsenal\/\">recent ESET white paper<\/a>, will be given by researcher Zuzana Hromcova on October 2, 21:00-21.30 CEST. The presentation, \u201c<a href=\"https:\/\/vblocalhost.com\/presentations\/invisimole-first-class-persistence-through-second-class-exploits\/\">InvisiMole: First-class persistence through second-class exploits<\/a>,\u201d will discuss the InvisiMole group\u2019s surprisingly effective strategy to evade detection using old exploits.<\/p>\n\n\n\n<p>You can join the livestreamed presentations anytime, and re-watch, rewind or pause them.<\/p>\n\n\n\n<p>The fourth presentation will be a recorded one by Ignacio Sanmillan on \u201c<a href=\"https:\/\/vblocalhost.com\/presentations\/ramsay-a-cyber-espionage-toolkit-tailored-for-air-gapped-networks\/\">Ramsay: A cyber-espionage toolkit tailored for air-gapped networks<\/a>.\u201d <a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/13\/ramsay-cyberespionage-toolkit-airgapped-networks\/\">This research<\/a> was first published in May 2020.<\/p>\n\n\n\n<p><a href=\"https:\/\/techxmedia.com\/tag\/eset\/\">ESET <\/a>Senior Research Fellow Righard\u00a0Zwienenberg will participate in a recorded panel debate on \u201c<a href=\"https:\/\/vblocalhost.com\/presentations\/panel-flattening-the-curve-of-cyber-risks\/\">Flattening the Curve of Cyber-Risks<\/a>\u201d in the Threat Intelligence Practitioners\u2019 Summit track.<\/p>\n\n\n\n<p>For more information, visit <a href=\"https:\/\/vblocalhost.com\/\">VB2020 localhost<\/a>\u2019s website and <a href=\"https:\/\/www.welivesecurity.com\/research\/\">WeLiveSecurity.com<\/a>, where the new research will be subsequently published. Make sure to follow <a href=\"https:\/\/twitter.com\/ESETresearch\">ESET research on Twitter<\/a> for the latest news from <a href=\"https:\/\/techxmedia.com\/tag\/eset\/\">ESET <\/a>Research.<\/p>\n","protected":false},"excerpt":{"rendered":"<p> ESET will highlight its top research for 2020 during the VB2020 localhost conference. This year, the Virus Bulletin international conference will go entirely online, thus the name change.<\/p>\n","protected":false},"author":8,"featured_media":12514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1595,9621],"tags":[3692,573,3695,771,3693,3694],"contributor":[],"class_list":["post-12512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-emerging-technologies","tag-cyber-espionage-discoveries","tag-eset","tag-eset-researchers","tag-malware","tag-vb2020","tag-virus-bulletin-international-conference"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/09\/VB2020_ESET-TECHXMEDIA.jpg","author_info":{"display_name":"Rabab","author_link":"https:\/\/techxmedia.com\/en\/author\/rabab\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/12512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=12512"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/12512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/12514"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=12512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=12512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=12512"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=12512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}