Press play for the primary episode as host Aryeh Goretsky is joined by Zuzana Hromcová to debate native IIS malware
Did you ever surprise why researchers behind a cybersecurity discovery selected to go down that individual rabbit gap? What made them inquisitive about that particular malware household, variant, or marketing campaign? Did they give you a selected identify for that malware within the bathtub, on a run, or simply used the very first thing within the code that hit them?
Any more, we’ll supply solutions to these and lots of different questions in our model new ESET Analysis podcast – as a result of there’s at all times extra to ESET analysis tales than what made it into the paper or blogpost.
So be it the broader context of an assault, some obscure artifact discovered throughout evaluation, or an inkling that lit a spark and led to a deeper dig within the malware, our host and ESET Distinguished Researcher Aryeh Goretsky will mine for it in his interviews with ESET researchers.
There shall be a brand new episode each time we publish main analysis, which often occurs a number of instances a 12 months.
Our first episode focuses on native IIS (Web Data Companies) malware – a risk that has been lurking within the shadows of public-facing servers since 2013, but is sort of invisible to their admins in addition to different defenders. Hearken to the fascinating journey of ESET malware researcher Zuzana Hromcová, who co-authored a comprehensive guide describing 14 IIS malware households discovered within the wild, utilized by each crimeware and APT risk actors.