Check Point Blog

Uncategorized July 14, 2016

Ransomware’s Motto: The Simpler, The Scarier, The Better

A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of different variants. Check Point researchers have been analyzing ransomware for almost two years,…

Read More
Threat Research July 11, 2016

Malware’s Constant Evolution Requires Advanced Protections

Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or at least stay hidden long enough to complete their malicious goals. In this…

Read More
Threat Research June 21, 2016

Top 10 Most Wanted Malware

Today Check Point published its Threat Index for May, revealing the number of active global malware families increased by 15 percent. Last month Check Point detected 2,300 unique and active malware families attacking business networks.…

Read More
Threat Research June 7, 2016

FACEBOOK MaliciousChat

Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile application. Following Check Point’s responsible disclosure, Facebook promptly fixed the vulnerability.   What is this vulnerability? The vulnerability allows…

Read More
Threat Research May 27, 2016

CryptXXX Ransomware: Simple, Evasive, Effective

CryptXXX emerged a few weeks ago and it’s been sneaky! It’s most impressive feature is the simplicity of its evasion techniques, which are giving it an advantage over most security systems. This has resulted in…

Read More
Threat Research May 26, 2016

Spam-Riding Dropper Packs a One-Two Ransomware, Adware Punch

The Most Trusty Attack Vector Shady random strangers on the internet often have an uncanny ability to make you believe that you should have expected to hear from them. You may be savvy enough to…

Read More
Threat Research May 24, 2016

TeslaCrypt Ransomware Shuts Down: One Down, Plenty to Go

In a surprising turn of events, the creators of the notorious TeslaCrypt ransomware shut down their operation and revealed the master key for decrypting all files. They even said they are sorry, as displayed in…

Read More
Threat Research

The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle

Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took place mainly to avoid signature-based detection employed by many security vendors. To understand how this is achieved, one must first…

Read More
Security Insights May 19, 2016

Everyday Malware Poses a Risk to Critical Infrastructure

Many people believe that only state-sponsored attacks can endanger critical infrastructure. They claim that such elaborate malware capable of targeting the inner workings of Industrial Control Systems (ICS) are not the work of simple hackers.…

Read More
Threat Research May 12, 2016

The Notorious TeslaCrypt V3 Ransomware: A Comprehensive Analysis

As the current wave of ransomware rages on, one stands out in its ability to adapt: TeslaCrypt. Although it emerged only in 2015, we are currently witnessing the malware’s third generation. Since its debut, it…

Read More