Check Point Blog

Hacking the Hacker

  How We Cracked the Code on DirCrypt Ransomware Ransomware has become a top computer security threat over the past few years, with a rapid evolution of variants and techniques. It is perhaps the most purely ‘evil’ form of malware in that it uses scare tactics to apply psychological pressure on the victim. Victims Don’t…

Read More
Threat Research August 27, 2014

Check Point Protects from the HAVEX Malware Targeting ICS/SCADA Systems

Dragonfly Cyber Espionage campaign overview Havex is a Remote Administration Tool (RAT) used recently by the “dragonfly” cyber espionage group. They were using the Havex malware to target Industrial Control Systems (ICS) and SCADA systems at energy companies across Europe and the US. Several methods were used to infect computers with the Havex RAT, such…

Read More
Threat Research August 11, 2014

GOZ – Is it game over, Zeus?

Overview Zeus is a highly sophisticated family of Trojans that seeks to steal banking information and accounts from victims. Zeus targets popular operating systems such as Windows and Android and is usually distributed to end-users through social engineering tactics such drive-by downloads and phishing emails. Although Zeus was discovered back in 2007, it remains popular…

Read More
Threat Research

Protecting computers from the damages of RAMDO Click Fraud Trojan

Details Ramdo is a family of Trojan horses which performs click fraud. This type of Trojan program is used to increase the number of visits on certain websites or to boost the number of hits for online ads. Ramdo installs itself by using an exploit kit, copies itself onto the system and creates an encrypted…

Read More
Threat Research

Don’t Become the Next Code Spaces: Learn best practices for using cloud services securely

Overview Code Spaces, which offered source code repositories and project management services hosted in Amazon’s Web Services for developers, was forced to cease operations in June after failing to meet the demands of cyber-extortionists. The company was first hit with a Distributed Denial of Service (DDoS) attack, followed by a devastating cyber breach that, in an instant,…

Read More
Threat Research