Security firm ESET is refuting reports that cyberattackers compromised its platforms and used them to target customers in Israel with dangerous wiper malware. However, it did note that a partner there, Comsecure, was impacted.

“We are aware of a security incident which affected our partner company in Israel last week,” the firm acknowledged on social media platform X. “Based on our initial investigation, a limited malicious email campaign was blocked within ten minutes. ESET technology is blocking the threat and our customers are secure. ESET was not compromised and is working closely with its partner to further investigate and we continue to monitor the situation.”

Security researcher Kevin Beaumont (aka Gossi the Dog) prompted the response after blogging about a malicious email that an ESET user posted on the ESET user forum. The email was flagged as malicious, with the subject line, “Government-Backed Attackers May Be Trying to Compromise Your Device!” It purported to be from the ESET team, offering extra security defense in the face of an ongoing attack:

ESET_Email.png

Source: ESET user forum.

The email had a .ZIP attachment that, if opened, unpacked a destructive wiper malware that bears resemblance to that used by the Handala threat group, according to the person who flagged the email for Beaumont. Handala, so named for the political cartoon character that has come to personify the Palestinian people’s national identity, is known for targeting Israeli organizations with file-destroying wipers in the wake of the Oct. 7 Hamas attacks and resulting war.

Related:Dark Reading Confidential: Meet the Ransomware Negotiators

Beaumont noted, “I managed to obtain the email, which passes both DKIM and SPF checks for coming from ESET’s store,” he said in the blog post. “Additionally, the link is indeed to backend.store.eset.co.il — owned by ESET Israel.”

This led Beaumont to conclude via Mastodon, “ESET Israel definitely got compromised, this thing is fake ransomware that talks to an Israeli news org server for whatever reason.”

ESET has now categorically refuted that takeaway, so the assumption is that the cyberattackers were using some sort of MO to get around anti-spoofing measures for the email and the .ZIP link. ESET did not immediately return a request for comment from Dark Reading for more information on Comsecure’s role in the incident and the attack routine.

The campaign is now blocked for ESET customers.

Source: www.darkreading.com