Check Point Blog

Threat Alert: WordPress Cross-Site Scripting

Overview   The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server. The attack code targets one of the latest versions of WordPress, making it a zero-day exploit that could set off a series of site hijackings…

Read More
Threat Research April 29, 2015

Stopping the Next Massive Cyberattack

Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, cover stories of major newspapers and banners flashing with details of the latest data breach. Unfortunately, the headlines displaying their successes leave their victims in a compromised, and often fiscal, mess. These cyber masterminds have become unpredictable in their methods…

Read More
Security Insights April 24, 2015

Analyzing the Magento Vulnerability (Updated)

Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento web e-commerce platform that can lead to the complete compromise of any Magento-based store, including credit card information as well as other financial and personal data, affecting nearly two hundred thousand online shops.   Check Point privately disclosed the vulnerabilities together…

Read More
Threat Research April 20, 2015

Check Point Threat Alert – Simda

Overview   The Simda botnet is a network of computers infected with self-propagating malware which has compromised more than 770,000 computers worldwide.   Since 2009, cyber criminals have been targeting computers with unpatched software and compromising them with Simda malware. This malware may re-route a user’s Internet traffic to websites under criminal control or can…

Read More
Threat Research April 16, 2015

Protecting Beyond the Point of Sale

The sad reality is that retail breaches are becoming too common. With over a billion credit cards in circulation in the US and over 7 billion worldwide, credit card data has become a prime target for cybercriminals. An alarming number of data and network security breaches happen each year in the payment card and retail…

Read More
Security Insights

Check Point Threat Alert: AAEH/Beebone

Overview   AAEH, also known as BeeBone, is a family of polymorphic downloaders created with the primary purpose of downloading other malware, including password stealers, rootkits, fake antivirus, and ransomware. AAEH is often propagated across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. Other aliases include VObfus, VBObfus, and Changeup. The polymorphic…

Read More
Threat Research April 15, 2015

The Curious Incident of the Phish in the Night-Time: a Forensic Case Study

Names have been changed to protect the privacy of the individuals involved.   On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had used her account as a stepping stone for a total, indiscriminate phishing campaign.   Laurie is the chief administrative assistant…

Read More
Threat Research April 8, 2015

Segmentation is Great in Theory, but Who Has the Time?

Security is one of those, “pay a little now, or pay a lot later” concepts. Your data, your customer information, your intellectual property, your trade secrets, these are the lifeblood of your company. One bad hack could distract your team for months, set your product position back years or worse, put you out of business…

Read More
Security Insights April 1, 2015