Check Point Blog

Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices

Introduction Ransomware has been a well-known method of attack in the PC world for quite some time. Many PC-based ransomware variants have been thoroughly covered and their malicious payloads described by security researchers. In the past few years, however, a new breed of ransomware has appeared. This time, the target platforms are no longer workstations,…

Read More
Threat Research August 31, 2015

Leadership, Validation, Innovation and Continuous Improvement

From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day in today’s world, the business of threats has become an industry operating at a dizzying velocity. Combatting today’s industrial production of threats requires a unified, multi-layer threat prevention solution with an integrated sandbox.  A multilayer solution makes it more difficult…

Read More
Security Insights August 27, 2015

Certifi-gate Found in the Wild on Google Play

New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, Check Point publicly disclosed Certifi-gate, a new vulnerability on Android. Using anonymous data collected from the Certifi-gate scanner, an app that tells users if their devices are vulnerable, Check Point uncovered some startling new information: An instance of Certifi-gate was…

Read More
Threat Research August 25, 2015

JavaScript Hooking as a Malicious Website Research Tool

One of the top Internet threats today is drive-by download attacks which originate from exploits kits, hacked websites, spam campaigns and more. As browsers are the main tool for navigating the web, the main attack vectors are browser vulnerabilities, plugin and extension vulnerabilities, as well as some OS vulnerabilities.   We have been playing with…

Read More
Threat Research August 18, 2015

What You Can (and Can’t) Do Against Ransomware

It happens very quickly: one moment your files are there, and the next they’re not. All you did was download some “useful” software, or run an email attachment that you got from a colleague. The next thing you know, all your files have had their extensions changed to something nonsensical, and their contents have been…

Read More
Threat Research August 17, 2015

SSH Decryption Opens Door to Very Old Security Vectors

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH uses the client-server model with public host key fingerprints in order to prevent MiTM (Man in The Middle) attacks.   Cybercriminal usage It’s very common for hackers to use SSH in order…

Read More
Security Insights August 12, 2015

Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part II – Supremacy

In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only ‘Subscriber’ user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS…

Read More
Threat Research August 11, 2015

An Update on the Stagefright Vulnerability

What is Stagefright? Stagefright is a vulnerability in the Android media library that allows attackers to send a multimedia text messages that enable them to steal information off of a device. How can an attacker use Stagefright? Using a victim’s phone number, an attacker only has to send the malware-infected multimedia file to a device…

Read More
Security Insights August 10, 2015

Certifi-gate: Hundreds of Millions of Android Devices Could Be Pwned

(This post was edited to include additional remediation advice on August 10, 2015.) Check Point today released details about Certifi-gate, a previously unknown vulnerability in the architecture of popular mobile Remote Support Tools (RSTs) used by virtually every Android device manufacturer and network service provider. The Check Point mobile threat research team disclosed its findings…

Read More
Threat Research August 6, 2015

Introducing Check Point Mobile Threat Prevention

[Click here to learn more about today’s Certifi-gate Threat Advisory.] Introducing Check Point Mobile Threat Prevention We’re more mobile than we’ve ever been, so it’s no surprise that smartphones and tablets aren’t our second screens, they’re our first. These devices move massive amounts of data around the clock and around the world, and while some…

Read More
Security Insights