A Malvertising Campaign of Secrets and Lies

July 30, 2018 6:00 am

Check Point Research has uncovered a large Malvertising campaign that starts with thousands of compromised WordPress websites, involves multiple parties in the online advertising chain and ends with distributing malicious content, via multiple... Click to Read More

Emotet: The Tricky Trojan that ‘Git Clones’

July 24, 2018 1:57 am

The Emotet Trojan downloader originally debuted in 2014 as a banking Trojan that took an unusual approach to stealing banking credentials; Instead of hooking per-browser functions in the victim’s web browser process, Emotet... Click to Read More

GlanceLove: Spying Under the Cover of the World Cup

July 12, 2018 6:02 am

When the whistle of the first match of the 2018 World Cup blew, it didn’t just signal the start of an exciting tournament for football fans worldwide, but also gave the green light... Click to Read More

Cyber Attack Trends: 2018 Mid-Year Report

July 12, 2018 6:00 am

When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations, as well as the security research community, constantly challenged. In our Cyber Attack Trends: 2018 Mid-Year Report we... Click to Read More

Deep Dive into UPAS Kit vs. Kronos

June 12, 2018 12:53 pm

By Mark Lechtik Introduction In this post we will be analyzing the UPAS Kit and the Kronos banking Trojan, two malwares that have come under the spotlight recently due to the back story... Click to Read More

Scriptable Remote Debugging with Windbg and IDA Pro

June 7, 2018 3:21 pm

(updated December 2018) Required Background: Basic experience with virtual machines, i.e. creating a VM and installing an OS. The most technically involved it gets is setting up a working SSH server on one... Click to Read More

Remote Code Execution Vulnerability on LG Smartphones

May 8, 2018 8:58 am

Research by: Slava Makkaveev Background A few months ago, Check Point Research discovered two vulnerabilities that reside in the default keyboard on all mainstream LG smartphone models (termed by LG as ‘LGEIME’). These... Click to Read More

Telegram: Cyber Crime’s Channel of Choice

May 7, 2018 11:41 pm

Introduction The Dark Web is a hive of illicit activity. From illegal guns and drug dealing to the Ransomware-as-a-Service programs buyers and sellers can use this medium to trade and exchange both knowledge... Click to Read More

SiliVaccine: Inside North Korea’s Anti-Virus

May 1, 2018 6:07 am

By: Mark Lechtik and Michael Kajiloti Revealed: In an exclusive piece of research, Check Point Researchers have carried out a revealing investigation into North Korea’s home-grown anti-virus software, SiliVaccine. One of several interesting... Click to Read More

A Crypto Mining Operation Unmasked

April 29, 2018 8:00 am

Introduction With the emerging threat of miners and the rise of cryptocurrencies that have taken the world by storm lately, Check Point Research has been keeping an eye out for mining campaigns. During... Click to Read More