ESET Online Help

Search English
Select the topic

Exploit

An exploit is a malicious code that takes advantage of some bug or vulnerability in someone's system to cause unexpected or unwanted computer behavior. This may involve gaining control over the entire computer system, escalating privileges or denial of service (DDoS attacks). Attackers often use this code to inject various types of malware into the system. The name comes from the English verb "to exploit," which means "to use something to one's advantage."

The most dangerous type of exploit is the so-called zero-day exploit, which uses previously unknown vulnerabilities, that is, vulnerabilities that are known only to the hacker and not to the software publisher until the hacker exploits them.

How to protect yourself?

The so-called Exploit Blocker is a security layer that prevents the misuse of errors in the most frequently used third-party applications. It monitors the suspicious behavior of processes that could indicate the exploitation of a certain bug in the system.

If you are using an ESET solution and the Exploit Blocker detects a suspicious process on the device, the process's running is immediately blocked, and the obtained data about the threat is sent to the ESET LiveGrid® cloud system. This data is subsequently analyzed in ESET's virus laboratories and will help protect users from unknown new threats and zero-day attacks.