Check Point Mobile Research Team Looks Back On 2017

February 18, 2018 3:06 am

The mobile world is extremely dynamic and changes rapidly, so it’s always a little hectic to follow its lead. For this reason, we try to stop every once in a while and take... Click to Read More

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

February 15, 2018 11:44 am

The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of attacks... Click to Read More

A New Rig Exploit Kit Campaign Dropping XMRig Miner

February 8, 2018 8:08 am

Cryptocurrency values may be tumbling but cyber criminals are still hedging their bets on its long term returns. Check Point researchers have discovered a new malvertising campaign leading to the Rig Exploit Kit.... Click to Read More

DorkBot: An Investigation

February 4, 2018 12:06 pm

Research By: Mark Lechtik Overview: DorkBot is a known malware that dates back to 2012. It is thought to be distributed via links on social media, instant messaging applications or infected removable media.... Click to Read More

H2 2017 Global Threat Intelligence Trends Report

January 25, 2018 5:28 am

2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game... Click to Read More

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

January 12, 2018 6:00 am

Research by: Elena Root & Bogdan Melnykov Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside around 60 game apps, several of which... Click to Read More

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

January 11, 2018 2:08 pm

In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks worldwide... Click to Read More

Exploiting CVE-2018-0802 Office Equation Vulnerabilty Demo Video

January 9, 2018 11:35 am

Check Point Software Technologies Research Team discovered a new vulnerability (CVE-2018-0802) in the Office Equation 3.0 process (EQNEDT32.EXE). This is a POC video of the vulnerability being exploited while bypassing the new ASLR... Click to Read More

LightsOut Mobile Malware Demo Video

January 9, 2018 11:10 am

 Video demo of how the malware works How It Works

Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability

January 9, 2018 10:38 am

By: Omer Gull and Netanel Ben Simon Background A few weeks ago, a vulnerability in the Office Equation 3.0 process (EQNEDT32.EXE) was discovered by Embedi. For a couple of reasons this event raised... Click to Read More