DeCypherIT – All eggs in one basket

December 12, 2019 12:01 am

Research by: Arie Olshtein These days, attackers use cheap and publicly accessible services to help them bypass Anti-Virus protections and gain a foothold in their victims’ systems. We give a behind the scenes... Click to Read More

Incident Response Casefile – A successful BEC leveraging lookalike domains

December 5, 2019 3:00 am

By Matan Ben David, Incident response Analyst Imagine that you’re the owner of a startup and waiting for a million-dollar seed round of funding, only it never shows up in your bank account.... Click to Read More

2nd December – Threat Intelligence Bulletin

December 2, 2019 9:13 am

For the latest discoveries in cyber research for the week of 2nd December 2019, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Check Point Research has found a nearly 223% increase... Click to Read More

Long-known Vulnerabilities in High-Profile Android Applications

November 21, 2019 3:12 am

Research by: Slava Makkaveev Introduction Most mobile users understandably worry about known vulnerabilities in the core operating system of their devices, which can give an attacker complete control over their mobile phones, and... Click to Read More

Phorpiex Breakdown

November 19, 2019 3:33 am

Research by: Alexey Bukhteyev Introduction We recently wrote about the massive “sextortion” spam campaign carried out by the Phorpiex botnet. However, this is only a small part of this botnet’s malicious activity. Capable... Click to Read More

The Road to Qualcomm TrustZone Apps Fuzzing

November 14, 2019 2:52 am

Research By: Slava Makkaveev Trusted Execution Environment TrustZone is a security extension integrated by ARM into the Corex-A processor. This extension creates an isolated virtual secure world which can be used by the... Click to Read More

21th October – Threat Intelligence Bulletin

October 22, 2019 8:03 am

For the latest discoveries in cyber research for the week of 14th October 2019, please download our Threat Intelligence Bulletin TOP ATTACKS AND BREACHES Check Point Research has exposed the Phorpiex botnet which... Click to Read More

TCP SACK Security Issue in OpenBSD – CVE-2019-8460

October 22, 2019 5:47 am

Reuven Plevinsky and Tal Vainshtein Background Following the recent hype over the TCP networking vulnerabilities found by Netflix in Linux and FreeBSD, for which Check Point quickly responded and provided protection, we have... Click to Read More

Pony’s C&C servers hidden inside the Bitcoin blockchain

October 17, 2019 5:57 am

Research by: Kobi Eisenkraft, Arie Olshtein Introduction Redaman is a form of banking malware distributed by phishing campaigns that target mostly Russia language speakers. First seen in 2015 and reported as the RTM... Click to Read More

In the Footsteps of a Sextortion Campaign

October 16, 2019 5:00 am

Research by: Gil Mansharov and Alexey Bukhteyev Introduction In its 2018 annual publication, the FBI IC3 (Internet Crime Complaint Center) reported a 242% rise in extortion emails, the majority of which are “sextortion”,... Click to Read More

The Eye on the Nile

October 3, 2019 1:19 am

  Introduction Back in March 2019, Amnesty International published a report that uncovered a targeted attack against journalists and human rights activists in Egypt. The victims even received an e-mail from Google warning... Click to Read More

Mapping the connections inside Russia’s APT Ecosystem

September 24, 2019 5:57 am

Research by Itay Cohen from Check Point Research and Omri Ben Bassat from Intezer This research is a joint effort conducted by Check Point and Intezer. prologue пролог If the names Turla, Sofacy,... Click to Read More

UPSynergy: Chinese-American Spy vs. Spy Story

September 5, 2019 6:00 am

Research By: Mark Lechtik & Nadav Grossman   Introduction Earlier this year, our colleagues at Symantec uncovered an interesting story about the use of Equation group exploitation tools by an alleged Chinese group... Click to Read More

Advanced SMS Phishing Attacks Against Modern Android-based Smartphones

September 4, 2019 5:55 am

Research By: Artyom Skrobov, Slava Makkaveev Introduction Check Point Researchers have identified a susceptibility to advanced phishing attacks in certain modern Android-based phones, including models by Samsung, Huawei, LG and Sony. In these... Click to Read More

Say Cheese: Ransomware-ing a DSLR Camera

August 11, 2019 10:55 am

Research by: Eyal Itkin TL;DR Cameras. We take them to every important life event, we bring them on our vacations, and we store them in a protective case to keep them safe during transit.... Click to Read More