Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

February 15, 2018 11:44 am

  The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of... Click to Read More

A New Rig Exploit Kit Campaign Dropping XMRig Miner

February 8, 2018 8:08 am

  Cryptocurrency values may be tumbling but cyber criminals are still hedging their bets on its long term returns. Check Point researchers have discovered a new malvertising campaign leading to the Rig Exploit... Click to Read More

DorkBot: An Investigation

February 4, 2018 12:06 pm

Research By: Mark Lechtik   Overview: DorkBot is a known malware that dates back to 2012. It is thought to be distributed via links on social media, instant messaging applications or infected removable... Click to Read More

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

January 12, 2018 6:00 am

Research By: Elena Root & Bogdan Melnykov   Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside around 60 game apps, several of... Click to Read More

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

January 11, 2018 2:08 pm

  In the last 24 hours, 30% of networks worldwide have experienced compromise attempts by a crypto-miner targeting web servers. During that period, the lone attacker attempted to exploit 30% of all networks... Click to Read More

Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability

January 9, 2018 10:38 am

Research By: Omer Gull and Netanel Ben Simon    Background A few weeks ago, a vulnerability in the Office Equation 3.0 process (EQNEDT32.EXE) was discovered by Embedi. For a couple of reasons this... Click to Read More

Detection of the Meltdown and Spectre Vulnerabilities

January 8, 2018 11:22 pm

Research By:  Erez Israel, Daniel Marx, Yoav Alon, Aviv Gafni and Ben Omelchenko    Last week, two publications regarding a pair of vulnerabilities named individually by their publishers as Meltdown and Spectre sent... Click to Read More

Malicious Flashlight Apps on Google Play

January 5, 2018 6:01 am

  Check Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts override the user’s decision to disable ads showing outside of... Click to Read More

Morfix And Its Users Fall Victim to Crypto-Mining

December 28, 2017 4:02 am

  Check Point Researchers have recently discovered a crypto-mining script running through Morfix, the popular Hebrew to English online dictionary, without its users’ knowledge or permission. The mining was operated by a JavaScript,... Click to Read More

Huawei Home Routers in Botnet Recruitment

December 21, 2017 1:21 am

  A Zero-Day vulnerability (CVE-2017-17215) in the Huawei home router HG532 has been discovered by Check Point Researchers, and hundreds of thousands of attempts to exploit it have already been found in the... Click to Read More