Check Point Blog

Meet The Hackers: A Series On Mobile Malware

Over the past year, every company in the world has experienced a mobile malware attack.   Mobile malware has become a major concern for both consumers and organizations worldwide. Although much has been written about which mobile malwares are prevalent and how the different variants operate, it’s critical to understand why attackers choose to target…

Read More
Corporate Blog February 26, 2018

Check Point Mobile Research Team Looks Back On 2017

The mobile world is extremely dynamic and changes rapidly, so it’s always a little hectic to follow its lead. For this reason, we try to stop every once in a while and take a look at what’s happened amidst the constant tracking of this ever chang…

Read More
Research February 18, 2018

Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

The Check Point research team has discovered what could potentially become one of the biggest malicious mining operations ever seen. As seen in our previous report of the RubyMiner, these types of attacks can be incredibly lucrative. Similar to the Rub…

Read More
Research February 15, 2018

Crypto-Miners Now Target Jenkins Servers

It’s one thing to discover a $10 note on the street, it’s quite another to happen upon $3 million in a Monero crypto-currency wallet. The Check Point research team recently came across such a finding and traced it to what can safely be called one of the biggest malicious mining operations ever discovered.   For…

Read More
Corporate Blog

January’s Most Wanted Malware: Cryptomining Malware Continues to Cripple Enterprise CPU Power

Check Point’s latest Global Threat Index reveals continued increase in the use of cryptomining malware among hackers   In January, cryptomining malware continued to be the most prevalent with Coinhive retaining its most wanted spot impacting 23 percent of organizations, followed by Fireball in second and Rig Exploit Kit in third impacting 17 percent of…

Read More
Corporate Blog

A New Rig Exploit Kit Campaign Dropping XMRig Miner

Cryptocurrency values may be tumbling but cyber criminals are still hedging their bets on its long term returns. Check Point researchers have discovered a new malvertising campaign leading to the Rig Exploit Kit. The first sighting of this particular c…

Read More
Research February 8, 2018

SandBlast Mobile delivers new Orange Mobile Threat Protection service

Mobile devices are critical to every organization’s digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network.   In fact, 20% of all businesses have been breached and an even larger number has no idea whether they’ve experienced a mobile attack, according…

Read More
Corporate Blog

Check Point CloudGuard Family is Here: Complete Gen V Cyber Protection for the Cloud

Some big news erupted today in Las Vegas at Check Point CPX 360° with the announcement of the immediate release of CloudGuardtm, Check Point’s new family of cloud security products. With CloudGuard solutions, enterprises are protected against Gen V cyberattacks on cloud infrastructure workloads (IaaS), services and software-as-a-service (SaaS) applications.   The CloudGuard cloud security…

Read More
Cloud security February 7, 2018

DorkBot: An Investigation

Research By: Mark Lechtik Overview: DorkBot is a known malware that dates back to 2012. It is thought to be distributed via links on social media, instant messaging applications or infected removable media. Although it is a veteran among the notorious …

Read More
Research February 4, 2018

SandBlast Protects Against Flash Zero-Day Vulnerability

In recent days, a critical Adobe Flash zero-day vulnerability has been discovered to be exploited in the wild. Attacks are reportedly being distributed by embedding malicious Flash objects into Microsoft Excel documents. Once infected, it allows the responsible hacking group to take full control of infected machines. When the Flash object is triggered, it installs…

Read More
Corporate Blog