Skip to content

The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods

Roman Cuprik

Cybercriminals increasingly utilize Ransomware as a Service boosted by EDR Killers. ESET meets the challenge with its prevention-first approach.

2024 marked a significant milestone in the fight against ransomware, bringing some good news and some bad news.

Let’s start with the good: the US Department of Justice and Europol cracked down on the infamous LockBit ransomware gang, inflicting a serious blow to the ransomware underworld.

The bad news? ESET researchers discovered new players quickly stepping in to replace those notorious but dissolving ransomware groups by using aggressive “business strategies” and tools to shut down endpoint protections.

Facing these new threats, businesses need to be prepared with prevention-oriented and multi-layered protection capable of staying one step ahead of cybercriminals.

Hotshots with fancy tools

Out of all the new players in the world of ransomware, perhaps RansomHub is the most notable, particularly due to its growth and tactics. The group posted its first victim in February 2024; by the end of that same year the group had taken a dominant position on the ransomware scene.

As any emerging Ransomware as a Service (RaaS) operator, to start, RansomHub needed to attract affiliates. To gather its “customers” quickly, the group allowed its affiliates to keep 90% of the collected ransoms, guaranteed the receipt of payments directly to the affiliate’s wallet, and offered multiple ways to enter its RaaS program, allowing even low-skilled affiliates to try their luck.

In the meantime, the group posted several updates, and by May 2024, had taken another significant step – RansomHub introduced its own Endpoint Detection and Response (EDR) killer, a type of malware designed to terminate, blind, or crash the installed security solution, typically by abusing a vulnerable driver.

RansomHub’s EDR killer, dubbed EDRKillShifter by Sophos, is a custom tool developed and maintained by the operator. This unique approach goes against the traditional strategy of reusing or slightly modifying existing proof of concepts available online or utilizing EDR killers available as a service on the dark web.

Meanwhile, ESET researchers discovered a single threat actor in possession of two EDRKillShifter samples, linked to multiple ransomware groups (BianLian, RansomHub, Medusa, and Play). This demonstrates another trend in the world of ransomware – skilled affiliates working for multiple operators in parallel, which enhances the operators’ malicious capabilities even further.

Ransomware gangs milking businesses

In 2023, organizations all around the world detected 317.59 million ransomware attempts. Manufacturing and the food/beverage industry were targeted the most.

Between 2022 and 2024, the combination of ransomware and other extortion breaches accounted for almost two-thirds (fluctuating between 59% and 66%) of financially motivated attacks, according to the Verizon 2024 Data Breach Investigations Report. The reason is simple – it works, and financially motivated threat actors have no reason to change tactics giving them the most return on investment.

Prevention vs. Response

However, even worse than the financial cost of a ransom payment is the disruption in business continuity and the sense of unease caused by malicious actors’ unfettered access, but that is not the whole story:

(-) After a successful cyberattack, revenue losses due to system downtime and missed opportunities reach on average 9% of the company’s annual revenue, and stock price value drops 2.5% on average.

(-) Subsequent forensic investigation can range from $10K to $100K based on the business size.

(-) Of the organizations that have experienced a cyberattack in 2024, 47% report greater difficulty in attracting new customers and 43% report losing customers.

As shown by IBM’s 2024 Cost of a Data Breach Report, it took 284 days to identify and contain ransomware attacks. That’s quite a lot of time to deal with a compromise. In the face of prolonged disruption, therefore, it makes sense to list some ways to prevent ransomware attacks, such as:

(+) Employee training and AI, which are the most significant factors in reducing the costs of data breaches.

(+) With AI and automation deployed extensively, organizations averaged $2.2 million less in costs of data breaches in 2024.

(+) In a scenario where a business experiences two cyberattacks over a 10-year period, the direct costs in the reactive scenario are $17 million, compared to $8 million in the proactive scenario.

To support such net-positive and cost-effective security measures, it also makes sense to discuss just how practical some security solutions can be in preventing ransomware and EDR killers from causing costly business disruptions.

How ESET protects against ransomware

ESET experts have put a lot of thought into combatting ransomware. By following a proactive and prevention-first approach, ESET regularly improves its solutions based on the latest trends and discoveries.

Let’s start with the basics. To achieve powerful multilayered protection, ESET PROTECT combines endpoint security with full disk encryption and cloud sandbox analysis of detected samples. ESET also developed a tool finetuned to catch ransomware – ESET Ransomware Shield, which detects and blocks processes that resemble the behaviors of ransomware. And this is “only” the first line of defense. Taking detection further, PROTECT integrates with Intel® Threat Detection Technology

(Intel® TDT) at the CPU level to improve detection of new ransomware variants.

Advanced users can also try their hand at using ESET Inspect, the XDR-enabling module of the ESET PROTECT Platform, which can easily pinpoint malicious behavior thanks to its AI-powered engine. As you can see on the image below, the detections are very easy to understand and can help in identifying sophisticated attempts at a compromise such as bring-your-own-vulnerable-driver (BYOVD) attacks, which can later introduce EDR killers on the impacted systems.

Worried about EDR Killers?

EDR Killers’ abuse of legitimate drivers to bypass cybersecurity solutions is a technique that is well-known to ESET experts. Therefore, ESET PROTECT allows security admins to create strong policies for Potentially Unsafe Applications (PUSA), preventing cybercriminals from abusing vulnerable drivers to breach EDR.

Admins should also look to enable or tune detections for malicious code targeting specific drivers – something providers of the most effective EDRs have already provided detections for. Locking down the components of your EDR on each endpoint is also a must; the users of that endpoint should not be able to tamper with security controls if they don’t have the necessary privileges. From this perspective, ESET has now received a prestigious anti-tampering award from AV-Comparatives for the second time, noting ESET PROTECT Elite’s 100% effectiveness in stopping tampering attacks.

Due to the increasing complexity of these solutions, a smart thing is to have all-in-one protection with all features available on a single security platform, which can deliver a comprehensive range of capabilities unified into a single pane of glass. This is exactly in line with ESET’s prevention-first approach, which promotes reducing the complexity of cyber defense. Alternatively, pursuing a highly rated managed detection and response service like ESET MDR can deliver a significant security impact without requiring costly internal security investments.

Protect your business, your money, and your reputation

Despite successful law enforcement operations against ransomware gangs, this field of cybercrime is so profitable that businesses around the world can hardly expect this threat to simply vanish. On the contrary, we can see the rise of new groups, tactics, and tools that pose new challenges.

To defend their hard-won business, companies need to be proactive, train their employees, set up reliable multilayered defenses utilizing the latest technology, and pursue a preventive security approach. As the latest data show, putting extra effort into cybersecurity is definitely worth it.

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET announces major integration with Splunk SIEM

  • ESET PROTECT, including its Detection and Response capabilities, integrates seamlessly with Splunk SIEM.
  • This integration empowers security admins to benefit from endpoint protection data correlated with other security insights in Splunk, facilitating rapid investigation and automated workflows.
  • Easier aggregation of ESET detection events with broader security telemetry within Splunk ensures holistic insight and a way for security teams to do more with fewer tools and less manual work.

BRATISLAVAApril 28, 2025 — ESET, a global leader in cybersecurity solutions, today announced a new major integration of its ESET Endpoint Management Platform (ESET PROTECT) with Splunk, a leading security information and event management (SIEM) platform.

Security professionals often find themselves stretched thin due to a general lack of resources, including talent. This presents opportunities for incomplete visibility and delayed response, which can be devastating in an era of burgeoning cyber-attacks. Thus, there is a demand for simpler workflows and enhanced efficiencies. This though requires a different approach, which is why integrations have become critical.

At ESET, we’ve already integrated our ESET PROTECT Platform or its modules with multiple solutions such as Microsoft Sentinel, Stellar Cyber, or IBM QRadar, and we are continuing this journey with the Splunk SIEM.

Splunk is widely used for IT operations, security, and business analytics, helping organizations gain valuable insights from their data. It is designed for searching, monitoring, and analyzing machine-generated big data via a web-style interface. It captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. It supports a wide range of data sources and provides tools for data ingestion, processing, and visualization, making it a versatile solution for managing and interpreting large volumes of data efficiently.

The ESET PROTECT Platform, including its Detection and Response capabilities (ESET Inspect), integrates seamlessly with Splunk SIEM, enabling organizations to consolidate security alerts and telemetry into a single pane of glass by:

  • Streaming ESET endpoint alerts directly to Splunk in real-time, allowing for immediate correlation with firewall logs, IDS/IPS data, and user activities.
  • Splunk can also query ESET for deeper endpoint insights and response actions. ESET can leverage Splunk’s advanced analytics and customized detection rules.
  • Splunk’s alerting and workflow capabilities can automatically trigger containment and remediation actions.

To achieve all this, ESET is supporting two approaches to data sharing:

  • Syslog-based integration – ESET PROTECT can export syslog-format events to Splunk.
  • API-based integration – ESET provides REST APIs allowing Splunk to query and pull relevant security events and telemetry directly.

Thanks to our varied data sharing methods, we can cater to diverse client architectures, leaving no one behind when it comes to their security needs or wants. Businesses of any size can benefit here, achieving a prevention-first security posture with a streamlined approach to threat response.

“At ESET, we are committed to improving our customers’ experience. This integration can augment their existing security toolset, supplying ESET threat data with network and user activity logs, enabling faster threat detection without the need to hop between multiple consoles,” said Pavol Šalátek, Director of Global Business Partnerships and Alliances at ESET. “This is also a boon for MSPs, which can integrate ESET data into their existing Splunk environments, offering advanced detection and response services for their diverse clientele,” he added.

Security analysts, incident responders or IT admins will find that by harnessing the award-winning power of the ESET PROTECT Platform, with its low impact on performance and capability to offer deep insight into devices, can enhance any existing setup, leading to risk reduction, satisfying business leadership and regulatory compliance.

Learn more about the way we approach integrations on our dedicated ESET integrations webpage.

Discover more about the ESET PROTECT Platform’s comprehensive power.

Find out how Splunk enhances threat response.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET World 2025: Staying protected with MDR

Márk Szabó

Discover what round-the-clock security means with James Rodewald, as he explains what makes ESET MDR the security service to get.

ESET World 2025 was an event that brought together top cybersecurity experts from all walks of life, so you’d expect tangible examples of what makes a business really stay secure. That’s exactly what James Rodewald, security monitoring analyst at ESET did.

During the session titled “Staying protected with ESET MDR,” Rodewald pointed out the critical pain points of IT admins and how managed detection and response (MDR) saves them time and unlocks new efficiencies, as well as sharing a story about a VPN gone rogue.

Day in the life of an IT admin

Usually, IT admins need to split their focus between many areas, and security is just another small part of their tasks, often getting less attention than necessary.

Of the many issues surrounding a company’s cybersecurity, their budgets are a key concern — proper security operations centers (SOCs) can be pricy, as covering hundreds of seats takes time and effort. Some companies assume that having two people cover an entire SOC’s capabilities is enough though, but Rodewald strongly disagrees: “They wouldn’t be able to monitor 24/7. … If something happens while they’re asleep or possibly on vacation, that could be really bad.”

While Rodewald doesn’t want to deter IT professionals from trying, he highlights that there are certain gaps that only security experts can fill: “IT admins are smart. They’re great at what they do. They make these beautiful systems that all communicate with each other — and that’s amazing. But sometimes they don’t know how to notice when somebody else is maliciously managing their network. And that’s where the dangers come in.”

ESET MDR to the rescue!

Securing added resources for IT admins to fight threats while they take care of daily tasks is what ESET MDR offers in spades. This is rather helpful for smaller businesses lacking security headcount within their IT departments, quickly leveling up their postures. “It’s like you set it and forget it. … Customers want somebody to monitor and be notified if something happened, what we did to remediate it, are there any actions they need to take,” said Rodewald about the service.

ESET MDR is a 24/7 threat management service for smaller organizations, using AI and human expertise for premium protection without in-house security specialists. Let ESET block, stop, and disrupt malicious behavior in just 20 minutes while you focus on core competencies.

While a basic MDR service can offer enterprise-grade security, with monitoring performed by earnest experts trained to stop security incidents (using top threat intelligence to empower their decisions), a lot more can be done for complex environments with a larger footprint. These environments need a specific approach, slotting in naturally to the existing security apparatus of a larger organization.

As Rodewald said, ESET MDR Ultimate (MDRU) is “for those customers that want to live with us in real time as we monitor their environment … benefits range from custom rule and alert creation, [to] optimizing the security environment … to finding unprotected devices, etc. So, across the range of these activities, we drive both operational and process maturity, help with remediation, and even flag those unprotected devices, sadly an all-too-common source of threats.”

ESET MDRU perfectly combines ESET technology and digital security expertise to effectively and proactively detect and respond to any threat. It is a tailored service, acting as a SOC-like security umbrella, with the ability to protect sophisticated environments with dedicated security teams.

Rodewald also highlighted ESET MDRU’s reports, explaining how the process is more human, connecting experts from both sides to design better protection rules and mechanisms in tandem, which adds even more value.

Maintaining 20 minutes to detect

The ESET MDR service tier maintains a 20-minute time to detect for all customers — currently having a 1-minute time to react and around a 5-minute time to resolve an incident. This is owed to 24/7 SOC-like monitoring, with our MDR teams constantly improving their decision-making processes with every single detection.

To achieve this fast detection and response rate, Rodewald elaborated on ESET MDR’s training regime: “The way we train is to ask the question, could we have spotted this sooner? Because if we can improve, then we want to improve. Also, would you be able to identify this [threat] if you saw it in the wild?” Relevant teams also examine research so they might better identify issues they hadn’t yet encountered.

As a result, ESET’s MDR teams can actively isolate false positives from real detections, apply novel incident response playbooks as needed, and manage trainings to keep analysts up to date on threats. For in-house teams (especially IT generalists), this might be a tough nut to crack, but it’s the vicious cycle that ESET security monitoring analysts are trained for.

Storytime with James

In a story about an ESET MDRU success, Rodewald spoke of how a VPN gone rogue led to FIN7 getting on a business’s network. The company in question, which owns a large network with multiple sites globally, was unknowingly breached prior to onboarding its ESET service (at least two to three months before). While it had an XDR solution employed, no one was monitoring it — a recipe for disaster.

Before the storm

In the beginning, someone had used PowerShell to create an external network connection, leading to a renamed remote monitoring and management (RMM) tool being installed (LiteManager). The PowerShell also had an interesting script called “PowerTrash,” which was over 6,000 lines long.

Next, the RMM tool, renamed to romfusclient.exe, started another execution chain to install an OpenSSH backdoor: “This backdoor would communicate with a remote C&C [command-and-control] server and allow whoever was in control to tunnel through this device to target other devices on the network,” said Rodewald.

How ESET MDRU helped

Shortly after ESET MDRU’s onboarding, monitoring picked up on lateral movement via remotely scheduled tasks — another instance of PowerTrash was being executed: “Its goal was to dump credentials and load Spy.Sekur into memory. At this point, we knew it was FIN7 because Spy.Sekur is only used by FIN7, and PowerTrash, I believe, is also exclusive to FIN7,” commented Rodewald. The latter was 41,000 lines of code, much longer than the previous instance.

“We started to see other lateral movement as we were creating custom rules to block things. … And we started to see this via both remote tasks and WinRM. We saw that their goal this time was to execute a batch file to execute a renamed version of RClone.exe in order to back up the file shares of the network and then use a renamed copy of 7-Zip to compress that all before they would then exfiltrate it,” Rodewald continued.

Killing and blocking

The MDR team then started to kill and block these processes while creating custom rules to disable them permanently. Nevertheless, this was happening across multiple devices, with multiple forms of lateral movement.

Since the MDR team had the source IPs of each of those movements, it understood that it had to locate unprotected devices in the customer’s environment because they weren’t showing up inside ESET PROTECT or ESET Inspect as being managed. “So, we’re on the phone at this point, and I’m having them remote me directly into these devices so I can see what’s going on. We found OpenSSH backdoors on multiple different devices — we needed to either have the client cut them off the network, or I needed to manually remediate the[m],” said Rodewald.

However, the adversary wasn’t done. Likely panicking as they were losing access, they dropped a new tool: “It was a never-before-seen DLL side-load!” exclaimed Rodewald. While the .exe may have been seen in the wild before (TopoEdit) it included a malicious DLL.

“They were trying to stay on the network. … We spotted that in less than 30 seconds,” said Rodewald with a smile. Thus, the MDR team blocked the clean .exe and the DLL and remediated it from about six or seven other devices, all within the same time frame.

Back to the origin

In parallel, the team became curious to investigate how initial access occurred: “We started pulling logs from devices, trying to find the trail of events … so we were doing digital forensic [incident] investigation.” Before they got too deep into that investigation, the threat actors showed their cards: Someone was using Remote Desktop Protocol (RDP) from private IPs to access different devices and immediately installing AteraAgent with Splashtop — two other RMM tools.

However, these IPs were on a specific subnet that was different from other devices on the network, which were quickly confirmed by the business’ admin as addresses assigned by the client’s VPN.

“Their VPN appliance was compromised. They had rogue devices owned by the threat actor joining the VPN and then RDPing to other devices,” Rodewald revealed. Hence, the MDR team had the company shut down its VPN, with no new activity since, though it is still being monitored.

This story highlights how thanks to the close-knit cooperation enabled by the ESET MDRU service, immediate action was taken, quickly developing new playbooks and security strategies for the client to prevent future incidents.

Prevention-first security

The key value of ESET’s MDR services lies in its prevention-first quality. With each of ESET’s managed services tackling different company architectures, the goal is the same — unlocking fast detection and almost immediate remediation, tackling novel threats before they can cause mischief.

Plus, as evidenced by Rodewald’s rogue VPN story, perhaps going for a managed service even while experiencing a compromise can enable businesses to snatch a security win from the creeping tentacles of a breach.

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET helps MSPs by integrating with the Kaseya VSA X RMM solution

  • ESET launches a new integration of its ESET Endpoint product with the Kaseya VSA X remote monitoring and management (RMM) solution.
  • MSP admins will find their workloads simpler, due to less time spent managing multiple solutions, giving them more space for their daily tasks.

BRATISLAVAApril 16, 2025 — ESET, a global leader in cybersecurity solutions, today announced the launch of another major integration, this time, with the Kaseya VSA X remote monitoring and management (RMM) software.

ESET has worked with MSPs for a long time, creating successful programs such as the ESET MSP Program, with subscription flexibility (pay only for what’s in use, no flat rates, no long-term commitment), co-management (independent seat count adjustment and subscription management), or  tier-based volume pricing (the more licenses sold, the better the unit price), among others.

Thus, we understand the needs of our partners as well as their clients. Among these is an interest in running efficient workloads, cutting down on time spent in “swivel chair” operations, and simplifying their use of multiple products, while not sacrificing on their security postures.

Such results are only achievable through integrations, which ESET identifies as a key contemporary trend. As a partner- and channel-focused cybersecurity vendor, we understand this, and we develop and maintain support for all the most prevalent RMM and PSA tools out there, now joined by Kaseya VSA X, a leading RMM product.

Thanks to this new integration, users of Kaseya VSA X can now also serve organizations that use ESET. In essence, it enables MSPs to deploy and manage ESET Endpoint products directly from within the Kaseya VSA X interface, so they can perform their necessary management actions without having to log in to a separate console.

With support for additional workflows, MSPs can set up automatic actions for common scenarios. For instance, a workflow can be used to automatically deploy ESET to a freshly provisioned machine, or a workflow could be configured to provide a notification in case a threat is detected on an endpoint.

Some other key features are:

  • “One Click” or automated deployment of ESET Endpoint products
  • Monitoring of endpoint health (product, version, protection status)
  • On-demand tasks such as scanning and activation

“We’ve been working with MSPs for a very long time, and ESET is a favorite vendor among thousands of MSPs across the world,” said Rob Jones, Global Channel Business Developer at ESET. “With the features provided through our new integration with Kaseya VSA X software, MSP administrators will unlock extensive benefits, such as simpler workflows, easier monitoring, as well as enhanced time savings. We know what MSPs need, and with this integration, we are directly addressing multiple pain points to make their businesses more efficient.”

Version 1.0 of this integration will support Windows endpoints that are running ESET Endpoint Antivirus, Endpoint Security, or Server Security.

ESET will be continuing its integration journey, so stay tuned for more updates in the future. In the meantime, feel free to check out our ESET integrations webpage to see the list of our existing partners and connections.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET launches integration with Wazuh

  • This integration provides seamless ingestion of ESET PROTECT, ESET Inspect, and ESET Cloud Office Security data into Wazuh’s security platform.
  • Wazuh’s open-source security platform is easy to deploy, and it offers cost-effective benefits, which the integration of ESET’s solutions boosts to further heights, benefiting our mutual customers.
  • The integration between ESET’s solutions and Wazuh helps SMBs and enterprises meet most of their security needs, irrespective of their maturity levels.
BRATISLAVA, SlovakiaApril 14, 2025 — ESET, a global leader in cybersecurity solutions, is continuing to increase its number of integrations, this time, by connecting with Wazuh, a popular open-source security platform. Cybersecurity is becoming more complex and difficult. B2B organizations might find obstacles in adjusting to this new reality. Therefore, interoperability has become crucial, which is also why ESET has adopted an API-first approach. As a result, the provision of strong security is easier than ever, as those organizations that need to correlate vast amounts of data from multiple sources, across several vendors, can create more efficient security workflows. The ESET Endpoint Management Platform (ESET PROTECT), including its Detection and Response capabilities (ESET Inspect), as well as ESET Cloud Office Security, integrates seamlessly with Wazuh, enabling organizations to consolidate security alerts, telemetry, and incidents in a single pane of glass. The integration works by using API-based integration – ESET provides REST APIs, allowing Wazuh to query and pull relevant security events, incidents, and telemetry directly. Consequentially, this integration should empower any security-conscious organization or professional with cost-effective, open-source security monitoring and compliance solutions. For example, security analysts or incident responders can use Wazuh’s dashboards to correlate ESET’s endpoint detection events with other logs, perform threat hunting, and develop comprehensive incident response playbooks. In the same vein, IT administrators can utilize Wazuh to generate summary reports, do compliance checks, and monitor operational metrics across their entire security stacks, including ESET-supplied data. Effectively, with this integration, security teams can do more with fewer tools and less manual work. “ESET provides security solutions that can protect one’s tomorrow today. With our integrations, we aim to lessen security burdens, and empower security operators with tools that create natural efficiencies, relieving many of their workflows. With data from ESET PROTECT, ESET Inspect, and ESET Cloud Office Security in Wazuh, they can cover the needs of an entire business environment from a single pane of glass,” said Michal Hájovský, Global Sales Lead at ESET. Visit our ESET integrations page for more information. Find out more about Wazuh’s open-source security platform. Discover more about the power of comprehensive security on the ESET PROTECT Platform page.  

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Recognized as Finalist in SC Awards for Cutting-Edge Ransomware Remediation

SAN DIEGO, Calif. — April 11, 2025ESET, a global leader in cybersecurity, today announced that it has been named a finalist in the prestigious 2025 SC Awards. ESET Ransomware Remediation has been recognized in the Best Business Continuity, Disaster, Ransomware Recovery Solution category as a finalist, underscoring ESET’s commitment to excellence and leadership in the cybersecurity industry. The SC Awards, now in its 28th year, recognize the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information systems.

“SC Awards are recognized worldwide by the cybersecurity community, and we are honored to be a finalist in the Best Business Continuity, Disaster, Ransomware Recovery Solutions category,” said Ryan Grant, VP of Marketing and Sales at ESET North America. “ESET has a history of innovation in mitigating ransomware, and Ransomware Remediation was launched to deliver comprehensive defense from encryption, theft and data holding. This recognition speaks to our continued investment in the ESET PROTECT platform and our commitment to offering businesses peace of mind in the fight against ransomware.”

Unlike solutions based on the Windows Volume Shadow Copy service, ESET Ransomware Remediation is a proprietary post-execution solution which works with and is enabled by ESET Ransomware Shield – monitoring for and blocking sophisticated attacks before they happen. Solving one of the most common failings of regular backups during a ransomware attack – the lack of isolation or segmentation of data — ESET Ransomware Remediation creates temporary encrypted backups of important data, all in a sequestered environment untouchable by untrustworthy apps and processes.

“From the rise of generative AI attacks to breaches exploiting third-party access and non-human credentials, the past year has reminded us that cybersecurity needs to be about innovations that help enterprises pivot, adapt, and thrive in a threat landscape that changes by the hour,” said Tom Spring, Senior Editorial Director, SC Media.

“Being named an SC Awards finalist is a recognition not only of technical innovation, but of a shared commitment to making the digital world safer,” Spring said. “It’s inspiring to see how this year’s community of finalists — across identity, cloud, data protection, and beyond—is pushing forward together, united by purpose.”

The 2025 SC Awards entries were evaluated across 33 specialty categories by a distinguished panel of judges, comprised of cybersecurity professionals, industry leaders, and members of the CyberRisk Alliance CISO community, representing sectors such as healthcare, financial services, education, and technology.

The 2025 winners will be announced on Tuesday, April 29, 2025, at RSAC ’25 in San Francisco at the SC Awards Reception. Find the full list of 2025 finalists on SC Media’s website here.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET has been recognized as a triple Strong Performer in the ECSO Cyberhive Matrix Q1 2025

BRATISLAVAApril 9, 2025ESET, a global leader in cybersecurity solutions, is proud to announce its recognition as a leading European provider in the ECSO Cyberhive Matrix Q1 2025 report across three categories: MDR Solutions with ESET PROTECT MDR, XDR Solutions with the ESET PROTECT Platform, and SOC Related Solutions with ESET Threat Intelligence. This recognition comes as a combined evaluation based on user satisfaction and European readiness criteria.

“We are honored to be recognized as a leading European provider across multiple categories in the ECSO Cyberhive Matrix Q1 2025 report. This acknowledgment underscores our commitment to delivering top-tier cybersecurity solutions that meet the evolving needs of our clients. Our ESET PROTECT MDR, ESET PROTECT Platform, and ESET Threat Intelligence have all demonstrated exceptional performance in terms of user satisfaction and European readiness,” said Zuzana Legáthová, Director of Test, Analyst Relations and Market Research at ESET. “We look forward to continuing our efforts in innovation and leadership within the cybersecurity industry, ensuring robust protection for businesses and individuals. This recognition highlights our dedication to cutting-edge threat detection, response capabilities, and European cybersecurity excellence.”

The Cyberhive Matrix™ is a comprehensive overview supporting end users and investors when exploring European cybersecurity solutions. It focuses on the European cybersecurity market and has been developed by ECSO, a nonprofit organization. It is designed to be transparent and reliable, and it was created in collaboration with the European cybersecurity industry, showcasing the readiness of European cybersecurity solutions and companies.

The Matrix is based on Cyberhive and open-source data, focusing on the maturity and European readiness of the solutions reviewed in the assessment. The report also provides an in-depth analysis of the solutions, including descriptions, vendor profiles, and European compliance status. The criteria used for the report are a combination of all the input gathered from the three user groups: vendors, end users, and investors.

Discover more about ESET MDR services, XDR solutions, and ESET Threat Intelligence offerings.

Read the full ECSO Cyberhive Matrix Q1 2025 report.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Even searching for protection can be dangerous. Stay informed about new risks with ESET Threat Intelligence

Threat Intelligence can save money, and it doesn’t need to be hard to understand.

Even people living thousands of years ago understood that “knowledge is power”, and amidst the digital era’s rapid developments in technology, including both cyber threats and cyber defense, this ancient wisdom applies more than ever.

A poignant  example, recent ESET research about the newly discovered China-aligned APT group PlushDaemon presented by ESET Malware Researcher Facundo Muñoz at JSAC 2025 conference. This research demonstrates how various users who were seeking protection in the form of a legitimate South-Korean VPN service but, alas, what they attempted to install was in fact trojanized VPN software that delivered spyware.

ESET endpoint protection stopped the malware, but for those who additionally field ESET Threat intelligence and its diversity of feeds, an even more powerful tool lays at their disposal – knowledge. Knowledge about the new threat, the compromised but legitimate URL, and Indicators of compromise (IoC). Using this knowledge, they could readily avoid the threat and check their defenses against the documented PlushDaemon tools.

PlushDaemon

In May 2024, ESET researchers noticed detections of malicious code in an NSIS installer for Windows that users from South Korea had downloaded from the website of a legitimate South Korean VPN company. This installer deployed both the legitimate software and the malicious implant that ESET researchers named SlowStepper.

Another attack vector for PlushDaemon is to intercept network traffic, hijack update protocols, redirect traffic to attacker-controlled servers, and deliver its SlowStepper implant.

However, SlowStepper is a backdoor that attempts to establish communication with a C&C server to receive further instructions. Once communication is established, SlowStepper can process multiple commands such as:

  • Collecting information from the compromised machine such as computer name, list of running processes, list of installed applications, whether cameras or microphones are connected, and more.
  • Executing a Python module from its toolkit; the output and any files created by the module are sent to the server.
  • Deleting the specified file.
  • Process various commands such as creating a complete report about the specified file or deleting the specified file, directory, or all files in a directory.
  • Uninstalls SlowStepper by removing its persistence mechanism and removing its files.

Dangers of data breaches

Going through the list of SlowStepper’s capabilities, it becomes clear that supply-chain attacks pose significant risks to businesses including financial losses due to system downtime, lost revenue, remediation costs, and reputational damage.

These attacks can also lead to data breaches and consequences can be ruinous. The average cost of a data breach jumped to USD 4.88 million from USD 4.45 million in 2023, according to IBM’s Cost of a Data Breach Report 2024. In fact, third-party breaches including supply chain breaches are among the top 3 factors that amplified breach costs.

On top of that, supply-chain attacks are not rare. Verizon’s 2024 Data Breach Investigations Report (DBIR) saw a 68% year-over-year growth in supply-chain attacks.

Yet, these attacks are only a fraction of cyber threats out there. See this list of most frequent attack vectors, according to IBM’s report:

  • Stolen or compromised credentials – 16 %
  • Phishing – 15 %
  • Cloud misconfiguration – 12%
  • Unknown zero-day vulnerability – 11 %
  • Business Email Compromise – 10 %
  • Malicious insider – 7 %

Threat intelligence – knowledge that saves money

Seeing these increasingly sophisticated attacks and how businesses are growing concerned about their cybersecurity, there is no surprise that the global threat intelligence market is projected to grow from USD 5.80 billion in 2024 to USD 24.05 billion by 2032.

IBM’s report calculated that a threat intelligence solution decreases average data breach cost by more than USD 240,000.

At the ESET WORLD 2024 conference, Tope Olufon, senior analyst at Forrester, a leading global market research company, stressed the importance of threat intelligence claiming that organizations need to understand the threat landscape and be prepared for upcoming threats.

However, organizations should also be smart about how they use the provided information – threat intelligence is not about counting detected samples but putting them into context and identifying the right stakeholders, according to Mr. Olufon.

What is ESET Threat intelligence?

Thanks to ESET LiveGrid technology, there are more than 110 million endpoints acting as sensors detecting malware. Combine this data with knowledge of ESET award-wining researchers, and you get a powerful tool that keeps users informed about the current threat landscape, adversaries, malicious programs and their properties, the servers used to propagate them, and even the URLs and domains which spread them.

A threat intelligence feed is an ongoing stream of data related to potential or current threats to an organization’s security that can be easily integrated to SIEM and TIP platforms. Instead of receiving a large amount of non-curated data, ESET shares a curated feed that features top-notch categorization and is pre-filtered for customers to use according to their preferences. Filtering is done by ESET researchers, who understand the internal data intimately.

Such filtering has multiple advantages for users. ESET feeds may be smaller in quantity, but all of the data are relevant and come with a very low rate of false positives. They also come with a significant amount of additional contextual data.

APT Reports provide contextual information about various adversaries, the latest APTs, technical analysis of threats, and activity summaries of the threat landscape. If a new threat is spreading quickly, ESET sends activity alert reports. Users can secure access to both human-readable reports and machine-readable Indicators of Compromise (IoCs).

If you are interested in ESET research blogs like PlushDaemon, or publicly available ESET APT Activity Reports and Threat Reports, bear in mind that these are just the tip of the iceberg of what you can see in documents received from ESET Threat Intelligence.

Now ESET has updated its Threat Intelligence service which consists of 15 feeds and has restructured the ESET APT reports into 3 tiers. Thus, businesses can choose what’s right for them. For example, while a large enterprise can get all the feeds and the highest tier APT report, some other businesses may opt just for a few feeds that are essential to secure their operations.

Users of the ESET Threat Intelligence APT Reports’ Advanced and Ultimate tiers can reduce complexity further with ESET AI Advisor, a specialized AI chatbot designed to provide information about APTs.

Here is the list of feeds:

  1. Malicious files feed
  2. Domain feed
  3. URL feed
  4. IP feed
  5. Botnet feed with two subfeeds:
    a) Botnet – C&C feed
    b) Botnet – Targets feed
  6. APT IoC feed
  7. Android infostealer feed
  8. Android threats feed
  9. Cryptoscam feed
  10. Malicious email attachments feed
  11. Phishing URL feed
  12. Ransomware feed
  13. Scam URL feed
  14. Smishing feed
  15. SMS scam feed

Feed your knowledge

As the world of cybercrime evolves rapidly, new threats are more sophisticated and agile, having access to intelligence about the threat landscape becomes a necessity. ESET Threat Intelligence and its data feeds can set businesses’ minds at ease knowing that they regularly receive the latest information about specific dangers.

What’s more, ESET works tirelessly to make this service as simple-to-use as possible. With APT reports enhanced by AI, curated intelligence feeds, filtering, and seamless integration, businesses can have the current threat landscape for breakfast.

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Launches Ransomware Remediation and AI Advisor Updates at ESET World 2025

  • ESET adds Ransomware Remediation to the ESET PROTECT Platform – offering next-gen ransomware rollback enhanced with remediation features. Working in tandem with ESET’s proprietary Ransomware Shield, Ransomware Remediation enables comprehensive rollback through automated file restoration from secure backups, limiting threat actor attempts to raise remediation costs.
  • ESET Cloud Office Security module updated with anti-spoofing and homoglyph protection, profoundly improving email security.
  • ESET has also expanded the availability of AI Advisor to its EDR/XDR customers, including those with ESET PROTECT Enterprise, ESET PROTECT Elite, and ESET PROTECT MDR subscriptions – while making performance updates.

LAS VEGAS, Nev.March 25, 2025 — ESET, a global leader in cybersecurity solutions, today released new updates for the ESET PROTECT Platform, including Ransomware Remediation, a new way to prevent ransomware encryption from causing long-term business disruption, as well as new functionalities for ESET Cloud Office Security and the ESET AI Advisor. These new cybersecurity features were launched at ESET World 2025, taking place in Las Vegas from March 24 to 26, 2025, at the ARIA Resort & Casino.

As ransomware attacks increase in sophistication, threat actors seek to undermine nearly all areas of business security and stability. One well-known and -used attack is encryption, which prevents you from accessing your device and the data stored on it. Causing costly process disruption, and ultimately forcing firms to pay to decrypt their systems, threat actors often target system backups, such as Volume Shadow Copy, by immediately deleting or corrupting them. This makes recovery nearly impossible and drives up remediation costs.

Building on ESET LiveSense, ESET’s next-gen Ransomware Remediation feature works in concert with Ransomware Shield to immediately create backups until the system confirms whether the suspicious activity is malicious or benign. If malicious, Ransomware Shield will kill the process and roll back the files from the newly created secure backups. If benign, the backups created can be discarded. Unlike other solutions, Ransomware Remediation has its own protected storage section on the drive, where files cannot be modified, corrupted, or deleted by the attacker. This differentiator actively solves one of the most common failings of regular backups during a ransomware attack. As a free addition for customers signed up for the ESET PROTECT Advanced tier and above, Ransomware Remediation is available for Windows-based systems.

“ESET has a history of innovation in mitigating ransomware, both in the context of our endpoint security platform, our service offerings such as ESET MDR, and our part in the ‘No More Ransom’ initiative, which partners with law enforcement and IT Security companies to disrupt cybercriminal businesses with ransomware connections,” said Michal Jankech, Vice President, Enterprise & SMB/MSP at ESET. “ESET’s Ransomware Remediation delivers comprehensive Ransomware defense, from encryption, theft and data holding. Easy to use, ESET’s Ransomware Remediation offers businesses peace of mind as we help them in the fight against ransomware.”

Email Security and AI Advisor Updates

ESET has added anti-spoofing and homoglyph protection to its ESET Cloud Office Security module, preventing attackers from pretending to be trusted sources while also identifying their efforts to disguise malicious domains or URLs through letter substitution from other alphabets. Moreover, ESET Cloud Office Security now also has an email clawback feature, enabling swift recall and quarantine of any delivered emails deemed suspicious. New dashboards are visually enhanced and include fully customizable tabs and components that fit a user’s specific needs.

ESET has also expanded the availability of AI Advisor to its EDR/XDR customers, including those with ESET PROTECT Enterprise, ESET PROTECT Elite, and ESET PROTECT MDR subscriptions – while making performance updates. By investing in AI, businesses are able to access SOC-level advisory, enabling enhanced security analyst workflows. Unlike other vendor offerings and typical generative AI assistants that focus on soft features like administration or device management, ESET AI Advisor seamlessly integrates into the day-to-day operations of security analysts. This is a gamechanger for companies with limited IT resources that want to utilize the advantages of advanced XDR solutions and threat intelligence feeds.

For more information about the ESET LiveSense technologies used by the ESET PROTECT Platform, please visit here.

For more information about the ESET PROTECT Platform, please visit our dedicated webpage.

For more information about ESET Cloud Office Security and the ESET AI Advisor, please visit our webpage and our AI blog.

To discover how ESET has been handling ransomware, please read ESET MDR success stories and ESET Inspect’s preventive power.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to turn back time on ransomware

Security solutions including ransomware remediation bolster resiliency and business continuity.

Ransomware is a critical threat that can instantly encrypt and lock users out of business computers, halting essential work processes. According to IBM’s Cost of a Data Breach Report 2024, the average cost of a ransomware attack is a staggering $4.91 million, with expenses escalating if law enforcement is involved. Recovery can span days, months, or even years, depending on the threat actor’s persistence and the security team’s preparedness. For companies that face double extortion ransomware – where cybercriminals encrypt sensitive user data and also threaten to publish it on the dark web, sell it to the highest bidder, or restrict access if the ransom is unpaid – the timeline for recovery can be even longer.

This makes recovery and related expenditures not just problematic, but potentially devastating, often leaving businesses at the mercy of cybercriminals even after paying the initial ransom.

A critical landscape for businesses of all sizes

The rapidly evolving nature of ransomware, including the involvement of nation-state actors, has created an increasingly hostile threat landscape for small and medium-sized businesses (SMBs), enterprises, and state infrastructure. Ransomware now accounts for 23% of all breaches, with SMBs particularly vulnerable due to limited cybersecurity budgets. In the Asia-Pacific region, 1 in 4 attacks against SMBs were ransomware-related, according to ESET. The urgency to bolster defenses has never been greater, as the frequency and sophistication of these attacks continue to rise.

What is ESET Ransomware Remediation?

Minimizing business impact in the event of a ransomware attack is paramount. Thus, ESET Ransomware Remediation (RR) combines prevention and remediation into one, providing a comprehensive multistage approach to combating encryption.

It all starts with the ESET Ransomware Shield (RS), which is triggered by suspicious actions. Like other behavioral detection systems, such as the ESET Host-based Intrusion Prevention System, it works in concert with ESET LiveSense technologies, dissecting and analyzing malware to its core. If ransomware is likely, RS flags it and initiates remediation.

ESET RR then starts creating file backups for any file operation impacted by the flagged process (before it can make any modifications). It will continue to do so until RS decides the process is OK, at which point the backup is discarded. Otherwise, RS decides the process is malicious, kills it, and rolls back files from the backup.

Ransomware Remediation is highly configurable. Adding or removing file types that need to be backed up can make a large difference.

This backup process is much more robust, as unlike Windows Volume Shadow Copy-based solutions, it is not a local service that can be abused by the attackers. RR has its own protected storage section on the drive where files cannot be modified or corrupted, nor can the backup be deleted by the attacker. This solves and actively blocks one of the most common failings of regular backups following a ransomware attack.

Days of future past

The role of the admin in the RR process is to understand the capabilities and add file types to the filter that RR applies when creating backups. The only limit to the backups is disk size (and a max size of 30MB per file).

While ESET Ransomware Remediation is very powerful, having other backups as described by the 3-2-1 rule is still a best practice. Always remember to have at least three different copies of data (including the original), two different media types (disk, tape), and one off-site copy (cloud).

All in all, ransomware can be quite sophisticated and troublesome, but it can still be combated. And thanks to secure backups, time travel is not so sci-fi anymore.

For more information on how ESET Ransomware Remediation works, please visit our webpage.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.