



"We are still investigating, but we have found tangible correlations to a group we internally call Stellera, which we will be reporting about in the near future." "We discard the possibility that this operation is the product of some financially motivated group," an ESET spokesperson told ZDNet today via email. adopt additional measures, notably encryption of sensitive data, to avoid exposing users' personal informationĪs for who's behind the attack, ESET doesn't know, but it knows who it wasn't.implement file integrity verification using MD5 hashing and file signature checks.use only HTTPS to deliver software updates in order to minimize the risks of domain hijacking and Man-in-the-Middle (MitM) attacks.
