Check Point Blog

Sort blog posts by:  

Crypto-Miners Now Target Jenkins Servers

 
It’s one thing to discover a $10 note on the street, it’s quite another to happen upon $3 million in a Monero crypto-currency wallet. The Check Point research team recently came across such a finding and traced it to what can safely be called one of the biggest malicious mining operations ever discovered.   For the past 18 months, this campaign has seen the XMRig miner malware running on many versions of Windows, draining personal computers of their computational resources. However, the threat actor, thought to be of Chinese origin, has now turned his attention to a far more powerful resource pool - the Jenkins CI server.   Used by DevOps teams around the world, ...

January’s Most Wanted Malware: Cryptomining Malware Continues to Cripple Enterprise CPU Power

 
Check Point’s latest Global Threat Index reveals continued increase in the use of cryptomining malware among hackers   In January, cryptomining malware continued to be the most prevalent with Coinhive retaining its most wanted spot impacting 23 percent of organizations, followed by Fireball in second and Rig Exploit Kit in third impacting 17 percent of organizations.  The Fireball malware impacted one-in-five organizations across the world, according to Check Point’s Global Threat Index’s Top 10 most prevalent malware.   Check Point researchers discovered that 21 percent of organizations have still failed to remove the Fireball malware from infected ...

SandBlast Mobile delivers new Orange Mobile Threat Protection service

 
Mobile devices are critical to every organization’s digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network.   In fact, 20% of all businesses have been breached and an even larger number has no idea whether they’ve experienced a mobile attack, according to a recent survey conducted by Dimensional Research.   To combat these burgeoning mobile attacks, Orange Cyberdefense, a division of the Orange Group focused on cybersecurity, and Check Point have partnered to secure enterprise mobile devices with a new Orange service called Mobile Threat Protection.   By ...

Check Point CloudGuard Family is Here: Complete Gen V Cyber Protection for the Cloud

 
Some big news erupted today in Las Vegas at Check Point CPX 360° with the announcement of the immediate release of CloudGuardtm, Check Point’s new family of cloud security products. With CloudGuard solutions, enterprises are protected against Gen V cyberattacks on cloud infrastructure workloads (IaaS), services and software-as-a-service (SaaS) applications.   The CloudGuard cloud security family provides consistent and comprehensive cloud security for virtualized datacenters to SDN, IaaS and SaaS applications, including the emerging threat of account takeover. The CloudGuard portfolio includes CloudGuard SaaS and CloudGuard IaaS, and seamlessly integrates with the largest ...

SandBlast Protects Against Flash Zero-Day Vulnerability

 
In recent days, a critical Adobe Flash zero-day vulnerability has been discovered to be exploited in the wild. Attacks are reportedly being distributed by embedding malicious Flash objects into Microsoft Excel documents. Once infected, it allows the responsible hacking group to take full control of infected machines. When the Flash object is triggered, it installs ROKRAT, a remote administration tool.   Adobe is planning to address this vulnerability and release a patch in the week starting February 5th.   Fortunately, Check Point SandBlast customers are already protected with multilayer protection that effectively blocks the zero-day attack both on the network and ...

How Can Your Business Score Touchdowns Without An Offensive Line?

 
What the Philadelphia Eagles Can Teach Us About Cyber-Security   Imagine your founding CTO resigning … right before your company’s biggest annual conference. How do you adapt, maintain momentum, and bring home wins?   The Philadelphia Eagles experienced the American football version of this nightmare scenario when their star quarterback, Carson Wentz, tore his knee ligaments a few weeks before the NFL playoffs. Before his injury, the betting markets had the Eagles as front-runners, with 6-to-1 odds to win the championship. The week after, their odds tumbled down to 9-to-1.   This weekend, 110 million people in the United States will celebrate one of the ...

The Check Point 2017 Global Threat Intelligence Trends Report

 
2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place between threat actors and security experts. In our H2 2017 Global Threat Intelligence Trends Report, we reveal that cyber-criminals are increasingly turning to cryptominers to develop illegal revenue streams, while ransomware and ‘malvertising’ adware continue to impact organizations worldwide. Based on data drawn from Check Point’s ThreatCloud intelligence between July and December 2017, the H2 2017 Global Threat Intelligence Trends Report gives a detailed overview of the ...

Growing a Global Company: Recapping Gil Shwed’s Interviews with Forbes and Inc

 
If you ask any Check Point researcher or engineer for one word that describes what Check Point does best, you’ll get a wide range of answers -- anything from “cybersecurity” to “cyber-security” to the rebels that’ll say “cyber security”.   But if you ask the press, you’ll get a very different answer. Growth.   Over the past week, Inc and Forbes sat down with our CEO, Gil Shwed, and asked him about his journey as an entrepreneur. They wondered - why would a founder stay with a company for so many years… why not cash out early, like most founders do? Gil talks about ingredients to Check Point’s success and his own personal insights from running one ...

December’s Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide

 
Check Point’s latest Global Threat Index reveals the rise of crypto-mining malware targeting enterprises   During the month of December 2017, crypto-mining malware rapidly rose in Check Point’s Global Threat Index’s top ten most prevalent malware.   Crypto-mining malware refers to cybercriminals hijacking the victim’s CPU or GPU power and existing resources to mine cryptocurrency. Check Point researchers found that crypto-miners managed to impact 55% of organizations globally, with two variants in the top three list of malware and ten different variants in the expanded top 100.  In December, the crypto-miner Coinhive replaced RoughTed as the most prevalent ...

Malware Displaying Porn Ads Discovered in Game Apps on Google Play

 
In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children.   Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended for children. According to Google Play's data, the apps have been downloaded between 3 million and 7 million times.   Dubbed ‘AdultSwine’, these malicious apps wreak havoc in three possible ways: Displaying ads from the web that are often highly inappropriate and pornographic. Attempting to trick users into installing fake ...