Bumblebee: increasing its capacity and evolving its TTPs

October 3, 2022 2:18 pm

Research by: Marc Salinas Fernandez Background & Key Findings The spring of 2022 saw a spike in activity of Bumblebee loader, a recent threat that has garnered a lot of attention due to... Click to Read More

The New Era of Hacktivism – State-Mobilized Hacktivism Proliferates to the West and Beyond

September 29, 2022 12:58 pm

Introduction Until last year, hacktivism has primarily been associated with groups like Anonymous – decentralized and unstructured collectives made up of private individuals with a variety of agendas. Anonymous has launched multiple campaigns... Click to Read More

7 Years of Scarlet Mimic’s Mobile Surveillance Campaign Targeting Uyghurs

September 22, 2022 1:10 pm

Introduction In 2022, Check Point Research (CPR) observed a new wave of a long-standing campaign targeting the Uyghur community, a Turkic ethnic group originating from Central Asia, one of the largest minority ethnic... Click to Read More

Native function and Assembly Code Invocation

September 21, 2022 2:45 pm

Author: Jiri Vinopal Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases... Click to Read More

DangerousSavanna: Two-year long campaign targets financial institutions in French-speaking Africa

September 6, 2022 12:57 pm

Introduction Recent studies show that more than 85% of financial institutions in Central and Western Africa have repeatedly been victimized in multiple, damaging cyberattacks. In a quarter of these cases, intrusions into network... Click to Read More

Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications

August 29, 2022 12:57 pm

Research by: Moshe Marelus Highlights: Check Point Research (CPR) detected a Turkish based crypto miner malware campaign, dubbed ‘Nitrokod’, which infected machines across 11 countries The malware is dropped from popular software available... Click to Read More

Researching Xiaomi’s TEE to get to Chinese money

August 12, 2022 12:54 pm

Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the... Click to Read More

CloudGuard Spectral detects several malicious packages on PyPI – the official software repository for Python developers

August 8, 2022 12:59 pm

Highlights: CloudGuard Spectral detects 10 malicious packages on PyPI, the leading Python package index used by developers for the Python programming language Malicious packages install info-stealers that enable attackers to steal developer’s private... Click to Read More

Chinese actor takes aim, armed with Nim Language and Bizarro AES

June 22, 2022 12:52 pm

Executive Summary In this article, Check Point Research shares findings on a group / activity cluster with ties to Tropic Trooper: The infection chain includes a previously undescribed loader (dubbed “Nimbda”) written in... Click to Read More

Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials

June 14, 2022 12:57 pm

Introduction Check Point Research uncovers a recent Iranian-based spear-phishing operation aimed against former Israeli officials, high-ranking military personnel, research fellows in research institutions, think tanks, and against Israeli citizens. The attacks use a... Click to Read More

Vulnerability within the UNISOC baseband opens mobile phones communications to remote hacker attacks

June 2, 2022 12:52 pm

Research by: Slava Makkaveev Introduction Do you remember push-button telephones? Many of them were based on chips from Spreadtrum Communications Inc., a Chinese chip manufacturer founded in 2001. In 2011, over half of all... Click to Read More

XLoader Botnet: Find Me If You Can

May 31, 2022 2:37 pm

Research by: Alexey Bukhteyev & Raman Ladutska Introduction In July 2021, CPR released a series of three publications covering different aspects of how the Formbook and XLoader malware families function. We described how... Click to Read More

Twisted Panda: Chinese APT espionage operation against Russian state-owned defense institutes

May 19, 2022 1:22 pm

Introduction In the past two months, we observed multiple APT groups attempting to leverage the Russia and Ukraine war as a lure for espionage operations. It comes as no surprise that Russian entities... Click to Read More

#ALHACK: One codec to hack the whole world

May 18, 2022 1:09 pm

Research by: Slava Makkaveev, Netanel Ben Simon Introduction The Apple Lossless Audio Codec (ALAC) is an audio coding format developed by Apple Inc. in 2004 for lossless data compression of digital music. After... Click to Read More

Check Point Research detects vulnerability in the Everscale blockchain wallet, preventing cryptocurrency theft

April 25, 2022 1:06 pm

Research By: Alexey Bukhteyev Highlights Check Point Research (CPR) discovered a vulnerability in the web version of Ever Surf wallet, part of the Everscale blockchain ecosystem By exploiting the vulnerability, an attacker could... Click to Read More