Iran’s APT34 Returns with an Updated Arsenal

April 8, 2021 1:27 pm

Introduction Check Point Research discovered evidence of a new campaign by the Iranian threat group APT34 (aka OilRig), against what appears to be a Lebanese target, employing a new backdoor variant we dubbed... Click to Read More

Playing in the (Windows) Sandbox

March 11, 2021 2:30 pm

Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 – Windows Sandbox. This sandbox has some useful specifications: Integrated part of... Click to Read More

Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT

March 9, 2021 2:00 pm

Research by: Aviran Hazum, Bohdan Melnykov, Israel Wernik Check Point Research (CPR) recently discovered a new Dropper spreading via the official Google Play store, which downloads and installs the AlienBot Banker and MRAT.... Click to Read More

The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day

February 22, 2021 2:00 pm

Research by: Eyal Itkin and Itay Cohen There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the... Click to Read More

ApoMacroSploit : Apocalyptical FUD race

February 16, 2021 2:00 pm

1.1      Introduction At the end of November, Check Point Research detected a new Office malware builder called APOMacroSploit, which was implicated in multiple malicious emails to more than 80 customers worldwide. In our... Click to Read More

TikTok fixes privacy issue discovered by Check Point Research

January 26, 2021 1:55 pm

 Research by Eran Vaknin, Alon Boxiner In January 2020, we have published a research on TikTok, reporting we have found that a threat actor could reveal personal information saved on the account and... Click to Read More

Going Rogue- a Mastermind behind Android Malware Returns with a New RAT

January 12, 2021 1:49 pm

Research by: Aviran Hazum, Alex Shamshur, Raman Ladutska, Ohad Mana, Israel Wernik Introduction Now more than ever, we rely on our smartphones to keep in touch with our work, our families and the... Click to Read More

SUNBURST, TEARDROP and the NetSec New Normal

December 22, 2020 5:35 pm

Foreword In December 2020, a large-scale cyberattack targeting many organizations – predominantly tech companies, mainly in the United States, but not only there – was discovered to have been going on for several... Click to Read More

Game On – Finding vulnerabilities in Valve’s “Steam Sockets”

December 10, 2020 1:55 pm

Research by: Eyal Itkin Overview The beautiful thing about video games is that there’s something for everyone. You can play as a 19-year-old Canadian redhead trying to climb a difficult mountain; or as an... Click to Read More

Vulnerability in Google Play Core Library Remains Unpatched in Google Play Applications

December 3, 2020 1:58 pm

Research by: Aviran Hazum, Jonathan Shimonovich Overview: A new vulnerability for the Google Play Core Library was published in late August, which allows Local-Code-Execution (LCE) within the scope of any application that has... Click to Read More

Bandook: Signed & Delivered

November 26, 2020 2:21 pm

Introduction Check Point Research recently observed a new wave of campaigns against various targets worldwide that utilizes a strain of a 13-year old backdoor Trojan named Bandook. Bandook, which had almost disappeared from... Click to Read More

Pay2Key – The Plot Thickens

November 12, 2020 12:58 pm

Introduction Last weekend we issued a ransomware alert about a wave of attacks using a never-seen-before strain dubbed ‘Pay2Key.’ Our investigation suggested the ransomware operators were mostly targeting Israeli companies.  The ransomware used... Click to Read More

Ransomware Alert: Pay2Key

November 6, 2020 1:53 pm

Introduction Over the past week, an exceptional number of Israeli companies reported ransomware attacks. While some of the attacks were carried out by known ransomware strands like REvil and Ryuk, several large corporations... Click to Read More

Exploit Developer Spotlight: The Story of PlayBit

October 26, 2020 1:00 pm

Research By: Eyal Itkin and Itay Cohen Introduction Exploits have always been an important and integral part of malicious attacks. They allow attackers to gain capabilities that are not easy to achieve otherwise.... Click to Read More

Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints

October 2, 2020 1:00 pm

Research by: Itay Cohen, Eyal Itkin In the past months, our Vulnerability and Malware Research teams joined efforts to focus on the exploits inside the malware and specifically, on the exploit writers themselves.... Click to Read More