PreAMo: A Clicker Campaign found on Google Play

April 19, 2019 10:12 am

Research by: Avigayil Mechtinger, Andrey Polkovnichenko and Bogdan Melnykov   Summary: Checkpoint’s researchers, with the help of Craig Silverman at BuzzFeed, have uncovered a series of applications conducting fraudulent activities against Ad Agencies.... Click to Read More

The Muddy Waters of APT Attacks

April 10, 2019 6:00 am

  The Iranian APT, MuddyWater, has been active since at least 2017. Most recently though, a new campaign, targeting Belarus, Turkey and Ukraine, has emerged that caught the attention of Check Point researchers.... Click to Read More

Vulnerability in Xiaomi Pre-Installed Security App

April 4, 2019 6:00 am

Research by: Slava Makkaveev   Smartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect, however, is for... Click to Read More

Reverse Engineering the April Fools Snake Game For Fun (and No Profit)

April 3, 2019 1:35 pm

Research by; Yaara Shriki and Roman Zaikin   To celebrate this year’s April Fool’s Day, some of you may have noticed that Google added an interactive snake game inside its Google Maps application... Click to Read More

Karta – Matching Open Sources in Binaries

March 21, 2019 7:36 am

Research by: Eyal Itkin   Introduction “Karta” (Russian for “map”) is a source code assisted binary matching plugin for IDA. The plugin was developed to match symbols for an open source library in... Click to Read More

SimBad: A Rogue Adware Campaign On Google Play

March 13, 2019 6:22 am

Research by: Elena Root and Andrey Polkovnichenko   Check Point researchers from the Mobile Threat Team have discovered a new adware campaign on the Google Play Store. This particular strain of Adware was... Click to Read More

Operation Sheep: Pilfer-Analytics SDK in Action

March 13, 2019 6:22 am

Research by: Feixiang He, Andrey Polkovnichenko   Check Point Research has recently discovered a group of Android applications massively harvesting contact information on mobile phones without the user’s consent. The data stealing logic... Click to Read More

Cuckoo SandBox on AWS

March 11, 2019 6:23 am

  Cuckoo Sandbox: An Introduction From software vulnerabilities to APT groups, there are many areas of cyber research that Check Point Research is involved with. Arguably, one of the most challenging areas of... Click to Read More

PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services

March 6, 2019 6:00 am

Research By: Omer Gull   Introduction Many large organizations use Windows Deployment Services (WDS) to install customized operating systems on new machines in the network. The Windows Deployment Services is usually, by its... Click to Read More

MacOS Malware Pedia

March 4, 2019 5:59 am

A New InfoStealer Campaign Targets APAC Windows Servers

March 3, 2019 6:16 am

Research by: Arie Olshtein, Moshe Hayun, Arnold Osipov As time goes by, malware writers invent new methods to bypass security products. During our research, we came across an attack targeting Windows servers in... Click to Read More

Extracting a 19 Year Old Code Execution from WinRAR

February 20, 2019 6:00 am

Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over... Click to Read More

North Korea Turns Against New Targets?!

February 19, 2019 6:00 am

  Introduction Over the past few weeks, we have been monitoring suspicious activity directed against Russian-based companies that exposed a predator-prey relationship that we had not seen before. For the first time we... Click to Read More

Reverse RDP Attack: Code Execution on RDP Clients

February 5, 2019 6:00 am

Research by: Eyal Itkin Overview Used by thousands of IT professionals and security researchers worldwide, the Remote Desktop Protocol (RDP) is usually considered a safe and trustworthy application to connect to remote computers.... Click to Read More

SpeakUp: A New Undetected Backdoor Linux Trojan

February 4, 2019 6:01 am

  Check Point Research has discovered a new campaign exploiting Linux servers to implant a new Backdoor Trojan. Dubbed ‘SpeakUp’, the new Trojan exploits known vulnerabilities in six different Linux distributions. The attack... Click to Read More