Hackers imitated ESET, a major cybersecurity company, to attack associations with harmful wiper malware. The attack, which started on October 8, 2024, concerned a phishing movement that manipulated ESET’s brand and infrastructure to deceive victims. The hostile actors sent emails purporting to be from ESET’s Advanced Threat Defense Team, alerting recipients that state-backed assailants were targeting their gadgets.
These emails, which handed DKIM and SPF authentication statements, included links to download a fake safety tool called “ESET Unleashed.” Protection investigator Kevin Beaumont discovered the attack, and it looks like the negative files were hosted on ESET Israel’s legitimate territory.
The downloaded ZIP file included honest ESET DLLs alongside a hostile setup.exe, which was recognized as a wiper masquerading as ransomware. The wiper malware, dubbed “EIW” (ESET Israel Wiper) by investigator Costin Raiu, was developed to irreversibly erase data from infected systems.
The analysis demonstrated politically inspired notes entrenched in the malware, indicating a potential link to pro-Palestinian hacktivists. ESET has bought a “safety incident” involving its associate business in Israel, Comsecure. The group said that the negative email campaign was stopped within ten minutes and highlighted that ESET’s own systems were not compromised.
Regardless, using certified ESET parts in the attack raises queries about the extent of the violation. The movement targeted cybersecurity personnel within Israeli institutions, demonstrating a strategic attempt to disrupt the nation’s digital protection.
The timing of the attack, coinciding with the anniversary of the October 2023 Hamas incursion, also offers political motivations. While the assailants’ individuality remains unconfirmed, similarities have been noted with earlier movements attributed to the pro-Palestine group Handala. This company has been connected to sophisticated attacks against Israeli targets in recent months.
This incident emphasizes the evolving tactics of cyber peril actors, increasingly mimicking trusted protection agents to avoid defenses. As analyses persist, ESET and its members are operating to mitigate the attack’s effect and stop future incidents. Associations, especially those in Israel, are urged to exercise vigilance with uninvited emails and to verify the genuineness of security-related contacts through authorized channels.