October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat

 
Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet significant, actor in the threat landscape, allowing threat actors to extract substantial profits while victims’ endpoints and networks suffer from latency and decreased performance. The emergence of Seamless and CoinHive once again highlights the breadth and depth of the challenges organizations face in securing their networks against cyber-criminals. Following up on recent Check Point research that found that cryptocurrency miners can use up to 65% of ...

A New IoT Botnet Storm is Coming

 
A massive Botnet is forming to create a cyber-storm that could take down the internet. An estimated million organizations have already been infected. The Botnet is recruiting IoT devices such as IP Wireless Cameras to carry out the attack. New cyber-storm clouds are gathering. Check Point Researchers have discovered of a brand new Botnet evolving and recruiting IoT devices at a far greater pace and with more potential damage than the Mirai botnet of 2016. IoT Botnets are Internet connected smart devices which have been infected by the same malware and are controlled by a threat actor from a remote location. They have been behind some of the most damaging cyberattacks against ...

Boleto: The Perfect ‘Inside Job’ Banking Malware

 
The Brazilian cyberspace is known to be a whole ecosystem of its own and, although the banking malware that originates there has traditionally been somewhat basic, recent trends have indicated new and more refined tools for attack. Subsequently, what originally started in Brazil may well be about to spread to users of online banking worldwide. In May 2017, researchers at Talos analyzed a banking Trojan that was delivered in Portuguese via a spam campaign, a common delivery method for such malware. Upon opening the email attachment, victims would be redirected to a JAR file which executes a malicious JAVA code to initiate the malware installation process. Until now, the deeper inner ...

Baby, Who Can Drive My Car?

 
This is the third post in our IoT blog series. Read the first post about IoT in healthcare and the second post about smart cities here. Driverless cars have long been a feature in science fiction – and over the past few years, they’ve become a reality, with the major motor manufacturers developing and showcasing autonomous vehicles, with the vision of making road travel cleaner, more efficient and safer. While we have yet to see the truly driverless car on public roads, the cars that most of us drive every day are already far more intelligent and connected than we may realize.  And that connectivity can present a significant cybersecurity risk. A typical new car today is ...

September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings

 
Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks during September, with the ransomware impacting 11.5% of organizations globally over the course of the month. Locky has not appeared in our Global Threat Impact Index, which reports on the top ten most prevalent malware attacks globally every month, since November 2016. However, attacks in September were powered by the hefty Necurs botnet, which in itself was ranked at number ten in the table. These attacks shot Locky up 25 places overall, to sit just behind the Roughted malvertising campaign in pole position. Locky’s distribution began in February 2016, and it rapidly became one of ...

Check Point IoT Blog Series: Smart Cities Need Smart Security

 
The second in our Check Point IoT series, read our first post about securing IoT devices in healthcare here.  The smart city is sparking the imagination of planners, developers, governments, businesses and citizens all over the world. Smart cities combine pervasive web connectivity, smart IoT devices, artificial intelligence and machine learning. They collect and analyze, in real-time, multiple forms of data in order to create an interconnected fabric of devices that drive efficiencies across services critical to the city’s infrastructure such as utilities, transport, healthcare and emergency services. We’ve already seen smart cities improving citizens’ lives while realizing ...

Check Point IoT Blog Series: First, Do No Harm. Securing Healthcare IoT Devices

 
"When a hacker takes control of all networked medical devices at a hospital in Dallas and threatens to kill one patient every hour if his demands are not met, the Cyber team must find the source and figure out how they accessed an airtight security system." That’s the plot summary of an episode of crime drama CSI: Cyber, which was broadcast in late 2015. The episode proved to be prescient by predicting two attack trends that have emerged over the past 18 months. The first is targeting of hospitals by cybercriminals: in 2016, at least 14 hospitals were attacked with ransomware. A Los Angeles hospital reportedly paid $17,000 to regain access to medical records showing treatment history, ...

Highlights from CEO Gil Shwed’s Quora session

 
This week, our founder and CEO Gil Shwed participated in a fascinating Q&A session on Quora. He answered the Quora community’s top questions on cyber security, mobile security and innovation. Here are our editor’s pick highlights from his session. What will the field of cybersecurity look like in the next 10 years? In the coming 10 years, nation sponsored organizations will continue to develop cyber-attack technologies for defense and offense; financially driven criminal groups will continue to seek ways to monetize cyber-attacks; hacktivists will continue to use cyber to convey their messages; terrorist groups will also shift to cyber space; and finally – people with no ...

Check Point Infinity NGFW Earns Recommended in NSS Labs 2017 NGFW Group Test

 
I am pleased to report we achieved another NSS Recommended in the recent NGFW Group Test! This is our 6th NGFW Recommended since 2011 and our 14th NSS Recommended overall. Participating in credible, independent 3rd party testing is an important investment for us at Check Point. Independent testing provides valuable “point in time” feedback for us and we recognize it also provides important security validation for our customers and the overall market too. That said, we are very proud of our long-term track record of consistent leadership and excellence in security as validated by our track record in independent testing. We are even more excited about this “point in ...

Check Point R80 Just Made Neopharm’s Security Management Simpler

 
It’s becoming more challenging than ever to manage security across expanding networks, new technologies, and with growing business requirements. With the risk posed by modern threats, security teams need far more agility and visibility to efficiently manage it all. The Neopharm Group found what it needed—clear visibility, management efficiency and a way to reduce operational overhead—through Check Point’s R80 Security Management. I recently sat down with Amir Shay, the IT and Security Manager of the Neopharm Group. Through its family of companies, Neopharm Group is engaged in the research and development, manufacturing, marketing and sales of a broad range of products in the ...