• Languages
Language (English)
  • Українська (UA)
  • Русский (RU)
  • English (EN)
  • Deutsch (DE)
  • Français (FR)
  • Español (ES)
  • Беларуская (BY)
  • Български (BG)
  • Polska (PL)
  • Čeština (CZ)
  • Slovenský (SK)
  • Lietuvių (LT)
  • Latvijas (LV)
  • Nederlands (NL)
  • Português (PT)
  • Italiano (IT)
  • Svenska (SV)
  • Norsk (NO)
  • Dansk (DK)
  • ქართული (GE)
  • Română (RO)
  • Magyar (HU)
  • Ελληνικά (EL)
  • Deutsch (AT)
  • العربية (AR)
  • Türkçe (TR)
  • Azərbaycan (AZ)
  • Татарча (TAT)
  • 日本語 (JP)
  • 中文 (CN)
  • 한국어 (KR)

    Logo

    support informnapalm
    Navigation
    • Home
    • News & OSINT
      • Donbas
      • Crimea
      • Syria
      • Georgia
      • World
      • Summaries
      • Misc
      • Social review
    • Top Investigations
    • History
    • About Us

    ESET Antivirus Company in Service of Donbas Terrorists

    on 06/01/2016 | | Donbas | News | UCA Print This Post Print This Post
    • ru
    • de
    • ua
    • en
    • bg
    • sv
    • no

    Russia pulls strings around the world. Here is a recent example – the Slovak company ESET has helped Donbas terrorists by conducting an audit and publishing the report on cyber espionage by the Ukrainian intelligence services over the authorities of the so-called ‘DPR’ and ‘LPR’. Moreover, the audit was initiated not by the Russian distributor but the antivirus company’s central office in Bratislava. In particular, by a Russian expert, who has long settled down in the headquarters of ESET.

    MFA of Ukraine, the media and other officials, unfortunately, did not respond to the given incident. It is strange that the anti-virus company got away with the assistance to the terrorists and protection of the Russian militants from the Ukrainian cyber attacks.

    Why did ESET help terrorists

    Just a few days before the ESET’s controversial report, on May 9, the Ukrainian hackers from the cyber alliance of FalconsFlame and Trinity hacked the official websites of ‘DPR’ terrorist enclave and several outreach resources of the pro-Russian militants. Obviously, such a cheeky action seriously troubled the Russian leadership and security services. They were quick to give their answer.

    And now, a few days later, a press release with the investigation of cyber espionage over ‘militia’ was posted on a well-known resource habrahabr.ru in the ESET’s blog which is positioned as the official blog of the Russian office of the company. By the way, here is a quote from the press release: “The main objectives of groundbait were militia of the Eastern Ukraine”. Soon, fearing resonance, the article was ‘cleaned up’ as reported by Artem Baranov, a leading virus analyst at ESET in Russia:

    Screenshot_19It is obvious that ESET antivirus company conducted its research on the basis of the data provided by representatives of terrorist of ‘DPR’ and ‘LPR’. Otherwise, how could ESET have got the specific emails’ topics and attached documents. Below is a fragment from the research, translated by ESET in the Ukrainian:

    Screenshot_20

    ESET positions itself as apolitical but it is plain to see that they collaborate with the Russian terrorists in Donbas.

    Special attention should be paid to the author of research – Anton Cherepanov, a specialist from the Slovak office. We were not able to find his profile in social networks, just his Twitter account. And his LinkedIn profile says that he graduated from the South Ural State University (Chelyabinsk, Russia) in 2009.

    Anton Cherepanov not only carried out the research, but also made a presentation on this topic at Positive Hack Days forum, which took place in Moscow on May 17-18. In other words, the specialist actively promotes the story how the ruthless Ukrainian special services keep tabs on the ‘poor militia’ (read – ‘terrorists’).

    Screenshot_21

    Any journalist and blogger who feel like it can address Anton Cherepanov via his email cherepanov@eset.sk. For instance, it would be very interesting to know with whom of the militants or Russian curators contacted Anton Cherepanov, did he receive any reward for his research, what is the interest of the ESET company in this case, etc.

    Will ESET be banned in Ukraine?

    An anti-virus company that has access to the objects of national importance becomes very dangerous if ‘third parties’ meddle in its processes. For example, Evgeny Kaspersky graduated from the KGB Higher School in 1987, and starting from 2012, according to Bloomberg data, cooperation between ‘Kaspersky labs’ and the Russian special services have increased dramatically. Not surprisingly, Petro Poroshenko issued a decree in 2015 banning the use of the Russian ‘Kaspersky lab’ and ‘Doctor Web’ products in public institutions.

    Screenshot_22

    It means that the grounds for the imposition of sanctions against the Russian antivirus companies are also suitable for the ESET company.

    Is there a real threat to national interests?
    Yes, there is. Because in this case, ESET counteracted the fight against terrorist armed formations, meaning acted in the interests of the so-called ‘DPR’ and ‘LPR’ against the national interests of Ukraine.

    Is there a potential threat to national security if ESET’s Nod32 antivirus is installed in 75% of the state institutions of Ukraine, which means the company has access to the data of national importance?

    Does the company assist the terrorist? Yes, ESET helped terrorists by disclosing actions of the Ukrainian hackers. In fact, the company sided with the terrorists in this hybrid war of the Russian Federation against Ukraine.

    Original article by Alexey Minakov, translated by Stepan Grishin

    Tags: Donbas

    Recent Posts

    • Andriy Derkach and his tapes. About one special operation to interfere in the US presidential election

      08/10/2020 - 0 Comment
    • Hacked: Deputy Defense Minister of Russia Pavel Fradkov. Business interests of Kadyrov and Kabaev in the temporarily occupied territories of Ukraine

      05/01/2025 - 0 Comment
    • Analysis and examples of sanctions evasion schemes used by Russian military-industrial complex

      04/28/2025 - 0 Comment
    • Hacking of Z-volunteer Ivanov, a member of Putin’s United Russia party: real estate scheming in the occupied territories

      04/04/2025 - 0 Comment

    Related Posts

    • Identified: infantrymen from Chechnya in Donbas hostilities

      11/05/2021 - 0 Comment
    • Russia uses sport for people with disabilities and children to tie Lukashenko to the occupied territories in Eastern Ukraine

      11/02/2021 - 0 Comment
    • Occupied territories of Crimea and Donbas: Basic facts for international community

      03/31/2021 - 0 Comment

    3 Responses to “ESET Antivirus Company in Service of Donbas Terrorists”

    1. 06/06/2016

      Włamanie do baz danych propagandzistów FR. Część 1. Zenin: sprzyjanie terrorystom, offshory i wypoczynek w Europie - InformNapalm.org (Polski) Reply

      […] o sprzyjanie rosyjskim terrorystom walczącym na Donbasie. Szczegóły w naszych publikacjach: Producent antywirusów ESET w służbie terrorystów Donbasu i Producent antywirusów ESET tłumaczy się z pomocy rosyjskim terrorystom „Donieckiej […]

    2. 06/11/2016

      Russian propagandists hacked. Part 1. Zenin: assistance to terrorists, offshore dealings and European vacations - InformNapalm.org (English) Reply

      […] which has been recently implicated in assistance to Russian terrorists in Donbas. Read more: ESET Antivirus Company in Service of Donbas Terrorists and ESET Antivirus Company responded to accusations of assistance to the DPR pro-Russian […]

    3. 06/18/2016

      robert Reply

      ANY COMPANY THAT HAS RuSSian SCUM WORKING IN IT IS A real threat to national internest of all western nations and Ukriane and must be band from getting any government work..

    Leave a Reply Cancel Reply

    Your email address will not be published. Required fields are marked *


    *
    *

    Follow us on social media
    Slate | Sl8 | InformNapalm
    does not receive any financial support from any country’s government or large donors. Only community volunteers and our readers help us to maintain the site. You can also become one of the community volunteers or support InformNapalm with your donations:

    Patreon

    BuyMeACoffee

    USDT TRC-20: TUbRscbCFns4kvWbUnQRBow9ajxSXwxFJU

    Ethereum: 0xf8979c0e0f82EaF1E79704Eb10b750906868cb72

    Bitcoin: bc1qj6nmqwc75tkwv5zuq4x8ljq94xwqp2msf5kyv3

    • Home
    • Privacy Policy
    • Contact Us
    © 2014-2019. «InformNapalm». CC BY 4.0