Check Point Blog

Threat Research March 31, 2015

Volatile Cedar – Analysis of a Global Cyber Espionage Campaign

Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in Lebanon with political ties. Beginning in late 2012, the carefully orchestrated attack campaign we call Volatile Cedar has been targeting…

Read More
Threat Research December 9, 2014

How we Collect Infections by the Numbers?

We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack…

Read More
Threat Research April 9, 2014

It’s Alive: The Resurgence of ZeroAccess Botnet

Check Point Malware Research Group, 04/02/2014 Summary Through leveraging Check Point’s ThreatCloud security intelligence, in recent weeks, our vulnerability research team has detected a spike in ZeroAccess botnet activity. This is surprising given that this…

Read More
Threat Research April 8, 2014

Threat Emulation Identifies Spear Phishing Attack Using Near-Zero-Day Malware

Summary On October 22, 2013, Check Point’s ThreatCloud Threat Emulation service analyzed suspicious documents sent by email to end users at a media company. Analysis of the malware, which was intercepted through a Message Transport…

Read More
Threat Research November 26, 2013

Check Point Threat Emulation Finds “Joke-of-the-day” Chain Letter is No Joke

Summary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a macro in order to change the computer’s background “as a joke”. Like other email chain letters, the message propagates when…

Read More
Threat Research November 14, 2013

Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention

Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…

Read More
Threat Research November 1, 2013

Threat Emulation Exposes Widespread Malware Campaign

Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…

Read More