Check Point Blog

Research March 6, 2019

PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services

Research By: Omer Gull   Introduction Many large organizations use Windows Deployment Services (WDS) to install customized operating systems on new machines in the network. The Windows Deployment Services is usually, by its nature, accessible to a...

Read More
Research March 5, 2019

Jmail Breaker: Profiting from Joomla’s Mail Service

  Research By: Asaf G. and Adi I. Joomla! is one of the most popular CMS platforms and is used by hundreds of thousands of organizations worldwide. Over the years, many vulnerabilities were found in the product, such as Joomla Core Sterilizer Cros...

Read More
Research March 4, 2019

MacOS Malware Pedia

Research by: Ofer Caspi With a massive growth in new malware and infections, MacOS security awareness is now more important than ever, and yet many people believe that if they are using MacOS they are “safe” and should not be concerned about getting in...

Read More
Research March 3, 2019

A New InfoStealer Campaign Targets APAC Windows Servers

Research by: Arie Olshtein, Moshe Hayun, Arnold Osipov As time goes by, malware writers invent new methods to bypass security products. During our research, we came across an attack targeting Windows servers in APAC and revealed the attackers infrastru...

Read More
Blog Post February 20, 2019

Report: Cloud, Mobile and IoT as Weakest Links

By Richard Clayton, Research Product Marketing In the first installment of this 2019 Security Report we reviewed the latest trends and threats facing the IT security industry today. In the second we took a deeper…

Read More
Research

Vol.3 – 2019 Security Report

  In the first installment of this 2019 Security Report we reviewed the latest trends and threats facing the IT security industry today. In the second we took a deeper look at the cyber crime underworld to get a grasp on the democratization of cyb...

Read More
Research

Extracting a 19 Year Old Code Execution from WinRAR

Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive,...

Read More
Research February 19, 2019

North Korea Turns Against New Targets?!

  Introduction Over the past few weeks, we have been monitoring suspicious activity directed against Russian-based companies that exposed a predator-prey relationship that we had not seen before. For the first time we were observing what seemed to...

Read More
Research February 5, 2019

Reverse RDP Attack: Code Execution on RDP Clients

Research by: Eyal Itkin Overview Used by thousands of IT professionals and security researchers worldwide, the Remote Desktop Protocol (RDP) is usually considered a safe and trustworthy application to connect to remote computers. Whether it is used to ...

Read More
Research February 4, 2019

SpeakUp: A New Undetected Backdoor Linux Trojan

  Check Point Research has discovered a new campaign exploiting Linux servers to implant a new Backdoor Trojan. Dubbed ‘SpeakUp’, the new Trojan exploits known vulnerabilities in six different Linux distributions. The attack targets worldwide serv...

Read More