Check Point Blog

Research May 23, 2017

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take…

Read More
Research September 7, 2016

Email from PayPal? Don’t Get Attached!

Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such as your university, your Internet service provider, or your bank. These messages usually direct you to a spoofed website, have a…

Read More
Research April 26, 2016

Check Point Threat Alert: CryptXXX Ransomware

CryptXXX ransomware has been observed in the wild as of March 2016, delivered via the Angler Exploit Kit and spread through the Bedep trojan. The ransomware is demanding a $500 ransom to be paid in…

Read More
Research March 28, 2016

Check Point Threat Alert: SamSam and Maktub Ransomware Evolution

Executive Summary New and evolving ransomware campaigns, dubbed ‘SamSam’ and ‘Maktub’, use techniques not commonly observed in previously known ransomware. SamSam spreads by targeting and infecting servers that contain unpatched vulnerabilities. Maktub and Samsam do…

Read More
Research March 10, 2016

Threat Alert – KeRanger MAC OSX Ransomware

Research by: Ofer Caspi Overview A new ransomware dubbed ‘KeRanger’ was discovered on March 4, 2016. The malware is distributed via the Transmission BitTorrent installer version 2.90 for OSX. Unlike most ransomwares, the targeted operating…

Read More
Research February 1, 2016

Check Point Threat Alert: Exploit Kits

An exploit kit is a malicious toolkit whose purpose is to identify vulnerabilities in client machines. These vulnerabilities are then exploited in order to upload and execute malicious code on the client. Exploit kits also…

Read More
Research January 19, 2016

Something is Cooking in Brazil

Looking at the global cyber landscape, we can see many campaigns and persistent threats occurring at different locations around the world. One example that has not drawn much attention is Brazil’s nationwide fraud campaigns. These…

Read More
Research January 15, 2016

Check Point Threat Alert: Cryptowall 4

Executive Summary Ransomware is a type of malware that restricts access to an infected computer system and demands a ransom payment to remove the restriction. Some ransomware encrypt the files on the system’s hard drive,…

Read More
Research January 14, 2016

Check Point Threat Alert: BlackEnergy Trojan

Executive Summary BlackEnergy malware has been around since 2007, first appearing as a simple DDoS tool. In 2014, it made a comeback as a highly sophisticated and customized malware, featuring support for proxy servers and…

Read More
Research December 29, 2015

Check Point Threat Alert: Outlook OLE Vulnerability

Object Linking and Embedding (OLE), developed by Microsoft, allows users to embed and link to documents and other objects. However, a Remote-Command-Execution vulnerability was found in Microsoft Office that allows remote attackers to execute arbitrary…

Read More