Monday, June 9, 2025

ESET Analysis Podcast: CosmicBeetle


ESET Analysis

Learn the way a somewhat clumsy cybercrime group wielding buggy malicious instruments managed to compromise various SMBs in varied components of the world

ESET Research Podcast: CosmicBeetle

Some cybercriminal teams are refined, create superior schemes, cooperate with different attackers and do every little thing to remain underneath the radar. Then there are menace actors like CosmicBeetle – they lack the required abilities set, write crude malware, but nonetheless compromise fascinating targets, and obtain “stealth” through the use of odd, impractical and overcomplicated methods.

Our visitor, ESET senior malware researcher Jakub Souček, talks about his investigation into CosmicBeetle’s toolkit written in Delphi, and the truth that their malware is managed through graphical person interface (GUI) with buttons and textual content fields essential to arrange, management and run any assault on victims’ gadgets.

Discussing additional with ESET Analysis Podcast host and Distinguished Researcher Aryeh Goretsky, Jakub shared his view of CosmicBeetle’s encryption routine, details about their victimology, and particulars of their “involvement” with high-profile gangs resembling LockBit and RansomHub.

For particulars on how this crude and clumsy menace actor, whose malicious instruments are “riddled with bugs”, achieved to penetrate any of its targets, take heed to this ESET Analysis Podcast episode. To learn extra about actions of CosmicBeetle or different cybercriminal and state-aligned actors, comply with ESET Analysis on X (previously referred to as Twitter) and take a look at our newest blogposts and white papers.

If you happen to like what you hear, subscribe for extra on Spotify, Apple Podcasts, or PodBean.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com