Gozi: The Malware with a Thousand Faces

August 28, 2020 12:57 pm

1. Introduction Most of the time, the relationship between cybercrime campaigns and malware strains is simple. Some malware strains, like the gone-but-not-forgotten GandCrab, are intimately tied to a single actor, who is using... Click to Read More

An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods

August 27, 2020 12:57 pm

Research By: Alex Ilgayev Introduction The notorious banking trojan Qbot has been in business for more than a decade. The malware, which has also been dubbed Qakbot and Pinkslipbot, was discovered in 2008... Click to Read More

Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa

August 13, 2020 1:59 am

Research By: Dikla Barda, Roman Zaikin , Yaara Shriki  Introduction & Motivation “Please lower the temperature of the AC, it’s getting humid in here,” said Eric to Alexa, who turned the AC to... Click to Read More

Don’t be silly – it’s only a lightbulb

August 7, 2020 1:28 pm

Research by: Eyal Itkin Background Everyone is familiar with the concept of IoT, the Internet of Things, but how many have heard of smart lightbulbs? You can control the light in your house, and... Click to Read More

CPR Anti-Debug Encyclopedia: The Check Point Anti-Debug Techniques Repository

August 5, 2020 1:34 am

Debugging is the essential part of malware analysis. Every time we need to drill down into malware behavior, restore encryption methods or examine communication protocols – generally, whenever we need to examine memory... Click to Read More

Hacker, 22, seeks LTR with your data: vulnerabilities found on popular OkCupid dating app

July 29, 2020 2:00 am

No Actual Daters Harmed in This Exercise   Research by Alon Boxiner, Eran Vaknin With over 50 million registered users since its launch, and the majority aged between 25 and 34, OkCupid is... Click to Read More


July 22, 2020 2:00 am

In the past six months, the way we live and work has changed beyond recognition. To put it simply – life on earth has gone online. The change was not gradual but happened... Click to Read More

SIGRed – Resolving Your Way into Domain Admin: Exploiting a 17 Year-old Bug in Windows DNS Servers

July 14, 2020 10:39 am

Research by: Sagi Tzadik Introduction DNS, which is often described as the “phonebook of the internet”, is a network protocol for translating human-friendly computer hostnames into IP addresses. Because it is such a... Click to Read More

Would you like some RCE with your Guacamole?

July 2, 2020 2:31 am

Research by: Eyal Itkin Overview In many companies, the daily routine involves coming to the office each day to work on your company computer, safely inside the corporate network. Once in a while, a... Click to Read More

GuLoader? No, CloudEyE.

June 8, 2020 1:59 am

Italian company exposed on Clearnet earned up to $ 500,000 helping cybercriminals to deliver malware using cloud drives. Recently, we wrote about the network dropper known as GuLoader, which has been very actively... Click to Read More

Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign

May 28, 2020 2:02 am

Introduction Since 2013, many official websites belonging to governments worldwide were hacked and defaced by an attacker who self-identified as ’VandaTheGod.’ The hacker targeted governments in numerous countries, including: Brazil, the Dominican Republic,... Click to Read More

Safe-Linking – Eliminating a 20 year-old malloc() exploit primitive

May 21, 2020 1:55 am

Research by: Eyal Itkin Overview One of our goals for every research project we work on in Check Point Research is to get an intimate understanding of how software work: What components do they... Click to Read More

Reverse RDP – The Path Not Taken

May 14, 2020 2:07 am

Research by: Eyal Itkin Overview During 2019, we published our research on the Reverse RDP Attack: Part 1 and Part 2. In those blog posts, we described how we found numerous critical vulnerabilities... Click to Read More

Bugs on the Windshield: Fuzzing the Windows Kernel

May 6, 2020 3:44 am

Research By: Netanel Ben-Simon and Yoav Alon Background: In our previous research, we used WinAFL to fuzz user-space applications running on Windows, and found over 50 vulnerabilities in Adobe Reader and Microsoft Edge.... Click to Read More

Nazar: Spirits of the Past

May 5, 2020 7:00 am

In mid-2017, The Shadow Brokers exposed NSA files in a leak known as "Lost In Translation". Recently, researcher uncovered "Nazar", a previously-unknown APT that was mentioned in the leak. We decided to dive into each and every one of the components and share our technical analysis. What we found out, is far from being "advanced".