ESET, s.r.o., is a
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
company specializing in
cybersecurity
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
, founded in 1992 in
Bratislava, Slovakia. ESET's security products are made in
Europe
Europe is a continent located entirely in the Northern Hemisphere and mostly in the Eastern Hemisphere. It is bordered by the Arctic Ocean to the north, the Atlantic Ocean to the west, the Mediterranean Sea to the south, and Asia to the east ...
and provides security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.
The origins of the company date back to 1987, when two of the company's founders, Miroslav Trnka and Peter Paško, developed their first
antivirus program called NOD. This sparked an idea between friends to help protect
PC users and soon grew into an antivirus software company. At present, ESET is recognized as Europe's biggest privately held cybersecurity company.
History
;1987–1992
The product NOD was launched in
Czechoslovakia
Czechoslovakia ( ; Czech language, Czech and , ''Česko-Slovensko'') was a landlocked country in Central Europe, created in 1918, when it declared its independence from Austria-Hungary. In 1938, after the Munich Agreement, the Sudetenland beca ...
when the country was part of the
Soviet Union
The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
's sphere of influence. Under the communist regime, private entrepreneurship was banned. It wasn't until 1992 when Miroslav Trnka and Peter Paško, together with Rudolf Hrubý, established ESET as a privately owned limited liability company in the former Czechoslovakia. In parallel with NOD, the company also started developing Perspekt. They adopted the name ESET, from the Czech name of
Isis
Isis was a major goddess in ancient Egyptian religion whose worship spread throughout the Greco-Roman world. Isis was first mentioned in the Old Kingdom () as one of the main characters of the Osiris myth, in which she resurrects her sla ...
, the Egyptian goddess of health, marriage and love, as the company name.
;2003–2017
In 2013, ESET launched WeLiveSecurity, a blog site dedicated to a vast spectrum of security-related topics.
December 2017 marked the 30th anniversary of the company's first security product. To mark its accomplishments, the company released a short documentary describing the company's evolution from the perspective of founders Miroslav Trnka and Peter Paško. In the same year, the company partnered with
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
to integrate its technology into Chrome Cleanup.
;2018–present
In December 2018, ESET partnered with No More Ransom, a global initiative that provides victims of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
decryption keys, thus removing the pressure to pay attackers. The initiative is supported by
Interpol
The International Criminal Police Organization – INTERPOL (abbreviated as ICPO–INTERPOL), commonly known as Interpol ( , ; stylized in allcaps), is an international organization that facilitates worldwide police cooperation and crime cont ...
and has been joined by various national police forces. ESET has developed technologies to address the threat of ransomware and has produced papers documenting its evolution.
ESET became a founding member of Google's App Defense Alliance.
Products
ESET provides security products for home and business users. Its products cover all the main operating systems across server, cloud, and mobile deployments.
ESET's first product was NOD, an
antivirus
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
program for computers running the
MS-DOS
MS-DOS ( ; acronym for Microsoft Disk Operating System, also known as Microsoft DOS) is an operating system for x86-based personal computers mostly developed by Microsoft. Collectively, MS-DOS, its rebranding as IBM PC DOS, and a few op ...
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
. NOD32 1.0 for
Microsoft Windows
Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
was released in 1998 and version 2.0 in 2003. A third version,
ESET NOD32 Antivirus, followed in 2007 along with
ESET Smart Security 3, which added
antispam and
firewall modules.
ESET NOD32 Antivirus and additional related products with a wider suite of security functions, including ESET Smart Security Premium and ESET Internet Security,
are upgraded and released on an annual basis. In 2010, ESET released products for
macOS
macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
, with a business version now called ESET Endpoint Antivirus and a home version called ESET Cyber Security.
ESET also offers products for Android devices. The first version of ESET Mobile Security was announced in 2012. The product offers
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
protection and a call filter, an adware detector, payment protection, and theft protection (such as SIM card locking and total data wipes). In 2015, ESET introduced ESET Parental Control, which allows parents to monitor children's use of Android devices.
ESET Smart TV Security, designed to protect
Android TV from malware, phishing, and ransomware, was introduced in 2018 at the
Mobile World Congress
MWC Barcelona (formerly but still commonly referred to as Mobile World Congress) is an annual trade show dedicated to the mobile communications industry.
The event is held in L'Hospitalet de Llobregat, Spain, at the Fira de Barcelona Gran ...
event in Barcelona.
The company offers products to protect corporate data, ranging from
workstation
A workstation is a special computer designed for technical or computational science, scientific applications. Intended primarily to be used by a single user, they are commonly connected to a local area network and run multi-user operating syste ...
and
server protection with ESET PROTECT Entry to
endpoint detection and response
Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. a client device such as a mobile phone, laptop, Internet of things devi ...
with ESET Enterprise Inspector.
ESET also offers security products that help companies comply with
GDPR requirements. These include ESET Secure Authentication, a
two-factor authentication solution introduced in 2015, and ESET Endpoint Encryption, which ESET released in 2017 following the integration of DESlock+ products since 2015. ESET Endpoint Encryption offers file, folder, email, and virtual disk encryption, as well as a desktop shredder for secure file deletion.
Along with its individual products and packages, ESET offers services designed mainly for corporations and large companies. These include
managed detection and response, premium support, security audits, and incident response.
Technology
ESET has 13
R&D centres globally and is an operator in the field of malicious code detection. In 1995, ESET introduced
heuristic analysis into its detection engine.
ESET has been using
machine learning
Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
in its products, starting with
neural network
A neural network is a group of interconnected units called neurons that send signals to one another. Neurons can be either biological cells or signal pathways. While individual neurons are simple, many of them together in a network can perfor ...
s, since 1997. In 2005, ESET incorporated a machine learning-based technology called DNA Detections, which extracts selected features – called genes – from samples. These genes split samples into clean, malicious and potentially unwanted categories. In 2019, ESET released an Advanced Machine Learning detection layer that can analyze samples locally on endpoints even when offline.
In 2011, ESET replaced ThreatSense.NET with ESET LiveGrid
®,
a
cloud-based
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
reputation system that evaluates unknown or suspicious samples submitted anonymously by millions of ESET-protected endpoints from around the world for machine learning analysis on servers in
Bratislava
Bratislava (German: ''Pressburg'', Hungarian: ''Pozsony'') is the Capital city, capital and largest city of the Slovakia, Slovak Republic and the fourth largest of all List of cities and towns on the river Danube, cities on the river Danube. ...
.
ESET also uses additional security layers including
Botnet Protection, Network Attack Protection,
Script-Based Attacks Protection,
and
Brute-Force Attack Protection.
In 2017, ESET became the first security company in the world to implement a
UEFI Scanner. UEFI is a firmware that is loaded into a computer's memory during the startup process. The scanner can identify threats while the computer is booting up, before standard detection modules start running.
Malware research
ESET dedicates part of its operations to malware research, as well as to the monitoring of
advanced persistent threat groups and other cybercriminal groups, with 40% of the company's employees working in research.
One of the groups that ESET tracked is
Sandworm. After the
2015 attack on the Ukrainian power grid and the global
NotPetya ransomware attack in 2017 – both attributed to
Sandworm – ESET discovered Sandworm (more specifically, a subgroup that ESET tracks as TeleBots) deploying a new backdoor called Exaramel, which is a version of the main
Industroyer backdoor. As Industroyer was used in the 2016 blackout in Ukraine, ESET linked Industroyer to NotPetya, as well as to
BlackEnergy, which was used in the 2015 blackout.
At the time of the NotPetya outbreak, ESET and Cisco tracked down the point from which the global ransomware attack had started to companies afflicted with a TeleBots backdoor, resulting from the compromise of M.E.Doc, a popular financial software in Ukraine.
In March 2021, when Microsoft released out-of-band patches to fix the
ProxyLogon vulnerability affecting on-premises versions of
Microsoft Exchange Server, ESET discovered more than 10 APT groups leveraging the vulnerability to compromise them. ProxyLogon allows an attacker to take over any reachable Exchange server, even without knowing valid account credentials.
In addition, ESET found that multiple threat actors had access to the details of the vulnerabilities even before the release of the patches. Except for DLTMiner, which is linked to a known cryptomining campaign, all of these threat actors are APT groups interested in espionage: Tick, LuckyMouse, Calypso, Websiic, Winnti Group, Tonto Team, ShadowPad activity, The "Opera" Cobalt Strike, IIS backdoors, Mikroceen, DLTMiner, and FamousSparrow.
Another focus of ESET's research is on threats to Android devices. ESET discovered the first clipper malware in the
Google Play Store called Android/Clipper.C, which can manipulate
clipboard content. In the case of a
cryptocurrency
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership record ...
transaction, a wallet address copied to the clipboard could be quietly switched to one belonging to the attacker.
In the area of IoT research, ESET discovered the
KrØØk vulnerability (CVE-2019-15126) in
Broadcom
Broadcom Inc. is an American multinational corporation, multinational designer, developer, manufacturer, and global supplier of a wide range of semiconductor and infrastructure software products. Broadcom's product offerings serve the data cen ...
and
Cypress Wi-Fi chips, which allows
WPA2-encrypted traffic to be encrypted with an all zero session key following a Wi-Fi disassociation. Then ESET discovered another KrØØk related vulnerability (CVE-2020-3702) in chips by
Qualcomm
Qualcomm Incorporated () is an American multinational corporation headquartered in San Diego, California, and Delaware General Corporation Law, incorporated in Delaware. It creates semiconductors, software and services related to wireless techn ...
and
MediaTek, as well as in the Microsoft Azure Sphere development kit, with the main difference being that the traffic is not encrypted at all.
Other notable research includes the discovery of LoJax, the first
UEFI rootkit found in the wild, which was used in a campaign by the
Sednit (aka Fancy Bear)
APT group. LoJax is written to a system's
SPI flash memory from where it is able to survive an
OS reinstall and a
hard disk
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
replacement. LoJax can drop and execute malware on disk during the
boot process. In 2021, ESET discovered another UEFI malware called ESPecter, which is the second real-world bootkit after
FinSpy known to persist on the
EFI System Partition in the form of a patched Windows Boot Manager.
In 2021, ESET released the white paper ''Anatomy of native IIS malware'', which analyzed over 80 unique samples of malicious native extensions for Internet Information Services (IIS) web server software used in the wild and categorized these into 14 malware families — 10 of which were previously undocumented.
Among these families, IIS malware demonstrated five main modes of operation:
* IIS backdoors, which can remotely control compromised computers;
* IIS infostealers, which steal information such as login credentials and payment information;
* IIS injectors, which modify
HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
responses sent to legitimate visitors to serve malicious content;
* IIS proxies, which use the compromised server as unwitting parts of the
command and control infrastructure for another malware family; and
* SEO fraud IIS malware, which modifies the content served to
search engine
A search engine is a software system that provides hyperlinks to web pages, and other relevant information on World Wide Web, the Web in response to a user's web query, query. The user enters a query in a web browser or a mobile app, and the sea ...
s.
ESET also works alongside experts from competitors and police organizations all over the world to investigate attacks. In 2018, ESET partnered with the
European Cybercrime Centre — a specialist
Europol
Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating c ...
team that investigates
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
— as a member of its Advisory Group on Internet Security. ESET partnered with law enforcement agencies worldwide and
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
to target the
Dorkbot botnet in 2015 and the Gamarue (aka Andromeda) botnet in 2017. Then in 2020, ESET partnered with
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
, Lumen's Black Lotus Labs, and NTT Ltd. in an attempt to disrupt
Trickbot, another
botnet.
See also
*
Antivirus software
*
Comparison of antivirus software
*
Comparison of computer viruses
References
External links
*
{{DEFAULTSORT:Eset
Software companies of Slovakia
Companies of Slovakia
Computer security software companies
Companies based in Bratislava
Software companies established in 1992
Slovak brands