Check Point Blog

The Emergence of the New Azorult 3.3

Research by: Israel Gubi During the last week, Check Point Research spotted a new version of Azorult in the wild being delivered through the RIG exploit kit, as well as other sources. Azorult is a long known information stealer and malware downloader, …

Read More
Research October 17, 2018

National Cyber Security Awareness Month: Six Tips to Stop Phisherman

Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to protect themselves from cyber threats. In celebration of the month, we will be posting a series of blogs that provide…

Read More
Uncategorized

September 2018’s Most Wanted Malware: Cryptomining Attacks Against Apple Devices On The Rise

Check Point’s latest Global Threat Index reveals a near four-fold increase in cryptomining malware targeting iPhone users   Check Point’s researchers detected a near-400% increase in crypto-mining malware attacks against iPhones. The surge was seen in the last two weeks of September, when attacks against users of the Safari browser also rose significantly. These attacks…

Read More
Corporate Blog October 15, 2018

Godzilla Loader and the Long Tail of Malware

Research by: Ben Herzog To most victims, malware is a force of nature. Zeus, Wannacry, Conficker are all vengeful gods, out to punish the common man for clicking the wrong link. Even for a security analyst, it’s easy to fall into the kind of thin…

Read More
Research October 14, 2018

Safe Classrooms Start With A Safe Web: Check Point Presents SandBlast for Education

The 21st century student has the world at their fingertips.   They can access the entire collection of human knowledge just by typing a question into Google. They can mingle with their classmates from down the block in the same group chat as their friends from continents away. The internet’s vast power and reach has…

Read More
Corporate Blog October 11, 2018

Check Point Named Leader in Gartner Magic Quadrant for Enterprise Network Firewalls

With the average data breach costing businesses $3.8 million, enterprises need to secure their network with nothing short of the best of the best.   Check Point is proud to announce, that for the sixteenth time in the company’s history, Gartner’s Magic Quadrant has listed Check Point as a leader in the enterprise network firewall…

Read More
Corporate Blog October 8, 2018

Bloomberg: “China’s Big Hack”- Check Point Responds

Today Bloomberg published a breaking story, “The Big Hack: How China Used a Tiny Chip to infiltrate America’s Top Companies,” detailing a major attack on US servers by the PLA, infiltrating the supply chain of contract hardware manufacturers to embed a spy chip onto motherboards used in the thousands across the US in organizations ranging…

Read More
Corporate Blog October 4, 2018

Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware

In this part we show how to deal with obfuscated Windows API calls in Ngioweb malware using Labeless and x64dbg without reconstructing API-resolving algorithm. If you’re new to all this Labeless stuff, though, please refer to the previous articles in t…

Read More
Research October 3, 2018

Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.

In this part we show how to decrypt strings present in the module of Boleto malware – without reconstructing the decryption algorithm. If you’re new to all this Labeless stuff though, please refer to the previous articles in this series as they will be…

Read More
Research

Labeless Part 4: Scripting

In this part of our Labeless series, we will discuss the theory behind Labeless scripting. If, however, you’re new to all this Labeless stuff, please refer to the previous articles in this series as they will be helpful in explaining on what’s going on…

Read More
Research