ESET Analysis Podcast: EvilVideo

ESET Analysis Podcast: EvilVideo
ESET Analysis Podcast: EvilVideo


ESET Analysis

ESET researchers focus on how they uncovered a zero-day Telegram for Android exploit that allowed attackers to ship malicious recordsdata posing as movies

ESET Research Podcast: EvilVideo

Telegram, with almost a billion month-to-month customers, is a juicy goal for cybercriminals, particularly if they’ll exploit a zero-day vulnerability to unfold malicious code. ESET malware researcher Lukáš Štefanko bumped into one such exploit – which ESET named EvilVideo – being bought on an underground discussion board and went in to discover and report it.

Within the dialogue with our podcast host ESET Distinguished Researcher Aryeh Goretsky, Štefanko describes the findings of his evaluation, together with the truth that the flaw affected solely the Android model of the app however not the variations for Home windows and iOS.

He additionally detailed that within the proof of idea he analyzed, the exploit was bundled with an off-the-shelf spy ware referred to as Android/Spy.SpyMax however that may very well be swapped for some other malware of the attacker’s selection.

If you wish to know the way Telegram builders reacted to ESET reporting the vulnerability, how lengthy it took to repair, what number of victims had been discovered, or what customers and firms can do to remain secure, take heed to the most recent episode of the ESET Analysis podcast.

For an in depth report on EvilVideo or on the actions of quite a few menace actors, comply with ESET Analysis on X (formerly known as Twitter) and take a look at our newest blogposts and white papers on WeLiveSecurity.com. Should you like what you hear, subscribe for extra on Spotify, Apple Podcasts, or PodBean.

PS: For these of our listeners who’re attending the 2024 ESET Know-how Convention and enjoying together with our recreation of seize the flag, the flag for the CTF problem named “Radio Broadcast” is: podcasts_are_new_books.



Leave a Reply

Your email address will not be published. Required fields are marked *