LukasStefanko Profile Banner
Lukas Stefanko Profile
Lukas Stefanko

@LukasStefanko

Followers
24K
Following
2K
Media
2K
Statuses
3K

Malware Researcher at @ESET Android security, malware analysis, app vulnerability research https://t.co/dnQvb9BCZj

Slovak Republic
Joined December 2014
Don't wanna be here? Send us removal request.
@LukasStefanko
Lukas Stefanko
5 months
Just spotted a little "hello" from the #Crocodilus Android banker devs — they left a message in the logs right after the malware launches. Analysis of Crocodilus: https://t.co/frr3w5O2wm New developments: https://t.co/KJEcnaj7J8
14
48
232
@volrant136
Demon
24 days
@LukasStefanko
Lukas Stefanko
24 days
We identified two campaigns targeting #Android users with previously undocumented spyware impersonating #Signal and #ToTok via deceptive websites https://t.co/qH1jTyiMEf #ESET #ESETresearch
2
8
14
@krakenfx
Kraken
24 days
Uptober on Kraken is here. Deposit crypto or cash during the month of October. Get matched up to 2%
239
95
668
@LukasStefanko
Lukas Stefanko
24 days
We identified two campaigns targeting #Android users with previously undocumented spyware impersonating #Signal and #ToTok via deceptive websites https://t.co/qH1jTyiMEf #ESET #ESETresearch
1
12
27
@ESETresearch
ESET Research
24 days
#ESETResearch has identified two campaigns targeting Android users in the🇦🇪. The campaigns, which are still ongoing, distribute previously undocumented spyware impersonating #Signal and #ToTok via deceptive websites. https://t.co/8Rt9I1GV40 1/6
welivesecurity.com
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates.
3
31
69
@ESETresearch
ESET Research
2 months
#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6
56
676
3K
@NewsRestoration
Restoration News
3 days
Don't miss this week's episode of Restoration Spotlight with @BraedenSorbo streaming on all platforms!
0
2
8
@ESET
ESET
2 months
🔍 True or False? #AndroidMalware myths – busted! Cybersecurity expert @LukasStefanko tackles rapid-fire questions to separate fact from fiction. Think you’re malware-savvy? Find out. Watch #Unlocked403 on YouTube, and listen on Spotify & Apple Podcasts. @ESETresearch
2
4
8
@ESET
ESET
2 months
@LukasStefanko explains why smartphones are the perfect target for digital spies. 🎙️ Listen to Unlocked 403 Podcast now on Spotify, or Apple Podcasts, and stay one step ahead of digital threats. @ESETresearch #Unlocked403
0
2
3
@ESETresearch
ESET Research
3 months
In H1 2025, #ESETResearch telemetry recorded a 160% surge in #Android adware & clicker detections. Leading this spike is a colorfully branded threat #Kaleidoscope, responsible for 28% of all Android #adware detections in H1. 1/6
1
7
22
@ESETresearch
ESET Research
4 months
ESET Threat Report H1 2025: #ClickFix attacks surge 500%, SnakeStealer tops infostealer charts, and NFC fraud jumps 35x. Plus, chaos in the ransomware underworld and a new Android adware menace—Kaleidoscope. Dive into the full report: https://t.co/bZjtTEdlzf #ESETresearch
1
30
61
@LukasStefanko
Lukas Stefanko
5 months
Team from @CSIRT_KNF was kind enough to blur my name from their analysis :D
0
2
20
@karol_paciorek
Karol Paciorek
5 months
Malware #Crocodilus impersonates a fake “IKO Lokata” app — its icon closely resembles that of a major Polish bank 🏦. 📣 Delivered via fake ads on @Facebook. 🔗 Campaign domains: • iko-power-app[.sbs • iko-lokata[.icu 🧠 IoC: rentvillcr[.homes VT: https://t.co/Sa3wx7DEQZ
@CSIRT_KNF
CSIRT KNF
5 months
🚨 Uwaga! Cyberprzestępcy publikują fałszywe reklamy na portalu @facebook, zachęcające do pobrania złośliwej aplikacji na Androida 📱. Malware podszywa się pod rzekomo oficjalną aplikację „IKO Lokata” — która nie istnieje ❗ ⚠️ Po instalacji pobierany jest kolejny złośliwy
0
6
25
@ESETresearch
ESET Research
9 months
#BREAKING #ESETresearch NFC Android malware impersonates banking app in 🇵🇱 Poland. #NGate malware impersonates a banking verification application to steal NFC data and PIN from victims’ physical payment card. @LukasStefanko 1/3
6
45
114
@LukasStefanko
Lukas Stefanko
10 months
In the latest version of G-700 Android RAT was allegedly added exploitation of the #EvilVideo Telegram vulnerability (CVE-2024-7014) The exploit allows sending malicious APK files disguised as video EvilVideo: https://t.co/fb9FmhGhMt G-700 RAT: https://t.co/c6zDJUnvms
3
18
49
@binitamshah
Binni Shah
10 months
Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN : https://t.co/fH2K50CZgm credits @LukasStefanko
2
60
212
@ElementalX2
NtAlertThread
11 months
It was great meeting some really cool folks like @LukasStefanko , @Joseliyo_Jstnk @JaromirHorejsi and many others at @avar_asia and presenting my research on "Rise & Fall of Golang Malware" !
0
2
8
@LukasStefanko
Lukas Stefanko
11 months
Yesterday, I could share my and Jakub research about NFC relay malware #NGate at @avar_asia conference in #India 🇮🇳 In the picture is a screen from a demo where I show how to withdraw cash from an ATM without a physical payment card using smartphone, as was done by NGate TA #ESET
0
4
25
@androidmalware2
Mobile Hacker
11 months
Unusual Android malware distribution vector - physical analog letter ✉️ Fake letters were sent to people at their home addresses to download "Severe Weather Warning App" via the attached QR code. #Coper AKA #Octo2 banking malware is downloaded instead https://t.co/kRpPGA9sLu
3
75
188
@cherepanov74
Anton Cherepanov
1 year
BSides Bratislava is back! Save the Date: March 15th, 2025 #BSidesBA 📢 CFP is open until December, 31st 23:59 UTC. More info: https://t.co/mmsUnleQ6z
0
7
17