A Crypto Mining Operation Unmasked

April 29, 2018 8:00 am

  Introduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been keeping an eye out for mining campaigns.... Click to Read More

MMap Vulnerabilities – Linux Kernel

April 29, 2018 5:04 am

Research By: Eyal Itkin   As part of our efforts in identifying vulnerabilities in different products, from time to time we also review the Linux Kernel, mainly searching for vulnerabilities in different drivers.... Click to Read More

NTLM Credentials Theft via PDF Files

April 26, 2018 7:00 am

  Just a few days after it was reported that malicious actors can exploit a vulnerability in MS outlook using OLE to steal a Windows user’s NTLM hashes, the Check Point research team... Click to Read More

A New Phishing Kit on the Dark Net

April 24, 2018 5:54 am

  Check Point Research and the cyber intelligence company, CyberInt, have collaborated to discover the next generation in phishing kits, currently being advertised on the Dark Net. Unlike previous kits which are primarily... Click to Read More

Check Point’s 2018 Security Report

April 15, 2018 1:13 am

  2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full scale nation state attacks, it... Click to Read More

Uncovering Drupalgeddon 2

April 12, 2018 6:18 am

Research By: Eyal Shalev, Rotem Reiss and Eran Vaknin   Abstract Two weeks ago, a highly critical (25/25 NIST rank) vulnerability, nicknamed Drupalgeddon 2 (SA-CORE-2018-002 / CVE-2018-7600), was disclosed by the Drupal security... Click to Read More

Return of the Festi Rootkit

April 3, 2018 12:26 pm

  Festi, a once popular rootkit is back in the wild, distributed mainly by the RIG exploit kit. A long known Windows rootkit, Festi dates back to 2009 where at that time it... Click to Read More

Necurs is Back, Just in Time for Easter

April 1, 2018 12:15 pm

  After a drastic decline in the volume of spam coming from the Necurs spambot observed by Check Point Telemetry in the past month, the infamous botnet is back once again and is... Click to Read More

Tribute to Kris Kaspersky

March 29, 2018 3:03 am

  Just over a year ago one of the greatest minds in the cyber research world sadly passed away. Born in the small Russian village of Uspenskoye, Kris Kaspersky, originally named Nikolay Likhachev,... Click to Read More

Check Point Responds to AMD Flaws

March 19, 2018 6:12 am

  Following recent heated attention over possible flaws in AMD processor chips, Check Point Research was privately approached by the source of these controversial findings, CTS Labs, and was asked to verify their... Click to Read More

RottenSys: Not a Secure Wi-Fi Service At All

March 14, 2018 9:24 am

Research By: Feixiang He, Bohdan Melnykov, Elena Root   Key Findings: RottenSys, a mobile adware, has infected nearly 5 million devices since 2016. Indications show the malware could have entered earlier in the... Click to Read More

The GandCrab Ransomware Mindset

March 13, 2018 7:54 am

Research by: Ben Herzog Key Points: In 2018 even ransomware is agile. Learn about the mindset of the GandCrab ransomware developers. Take a deep dive into the inner workings of GandCrab’s operation. Get... Click to Read More

Guest Accounts Gain Full Access on Chrome RDP

March 13, 2018 1:29 am

Research By: Ofer Caspi, Benjamin Berger   Chrome Remote Desktop is an extension to the Chrome browser that allows users to remotely access another computer through Chrome browser or a Chromebook. It is... Click to Read More

Check Point Mobile Research Team Looks Back On 2017

February 18, 2018 3:06 am

  The mobile world is extremely dynamic and changes rapidly, so it’s always a little hectic to follow its lead. For this reason, we try to stop every once in a while and... Click to Read More

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

February 15, 2018 11:44 am

  The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of... Click to Read More