Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 2
33 résultats taggé checkpoint  ✕
Into the Trash: Analyzing LitterDrifter https://research.checkpoint.com/2023/malware-spotlight-into-the-trash-analyzing-litterdrifter/
27/11/2023 10:33:16
QRCode
archive.org
thumbnail

Gamaredon, also known as Primitive Bear, ACTINIUM, and Shuckworm, is a unique player in the Russian espionage ecosystem that targets a wide variety of almost exclusively Ukrainian entities. While researchers often struggle to uncover evidence of Russian espionage activities, Gamaredon is notably conspicuous. The group behind it conducts large-scale campaigns while still primarily focusing on regional targets. The Security Service of Ukraine (SSU) identified the Gamaredon personnel as Russian Federal Security Service (FSB) officers.

checkpoint 2023 EN LitterDrifter Ukraine analysis
Chinese Threat Actors Targeting Europe in SmugX Campaign https://research.checkpoint.com/2023/chinese-threat-actors-targeting-europe-in-smugx-campaign/
03/07/2023 21:47:15
QRCode
archive.org
thumbnail

In the last couple of months, Check Point Research (CPR) has been tracking the activity of a Chinese threat actor targeting Foreign Affairs ministries and embassies in Europe. Combined with other Chinese activity previously reported by Check Point Research, this represents a larger trend within the Chinese ecosystem, pointing to a shift to targeting European entities, with a focus on their foreign policy.

The activity described in this report, utilizes HTML Smuggling to target governmental entities in Eastern Europe. This specific campaign has been active since at least December 2022, and is likely a direct continuation of a previously reported campaign attributed to RedDelta (and also to Mustang Panda, to some extent).

checkpoint EN 2023 SmugX Europe research HTML Smuggling MustangPanda
Malicious VSCode extensions with more than 45K downloads steal PII and enable backdoors - Check Point Blog https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors/
16/05/2023 22:04:01
QRCode
archive.org
thumbnail

Highlights: CloudGuard Spectrals detected malicious extensions on the VSCode marketplace Users installing these extensions were enabling attackers to

checkpoint EN 2023 VSCode extensions malicious
Queuejumper: Critical Unauthorized RCE Vulnerability In MSMQ Service https://research.checkpoint.com/2023/queuejumper-critical-unauthorized-rce-vulnerability-in-msmq-service/
12/04/2023 01:01:43
QRCode
archive.org

Check Point Research recently discovered three vulnerabilities in the “Microsoft Message Queuing” service, commonly known as MSMQ. These vulnerabilities were disclosed to Microsoft and patched in the April Patch Tuesday update. The most severe of these, dubbed QueueJumper by CPR (CVE-2023-21554), is a critical vulnerability that could allow unauthorized attackers to remotely execute arbitrary code in the context of the Windows service process mqsvc.exe.

checkpoint EN 2023 analysis RCE Queuejumper CVE-2023-21554 MSMQ Service Critical PatchTuesday
Rorschach – A New Sophisticated and Fast Ransomware https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/
04/04/2023 14:31:31
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) encountered a previously unnamed ransomware strain, we dubbed Rorschach, deployed against a US-based company.
    Rorschach ransomware appears to be unique, sharing no overlaps that could easily attribute it to any known ransomware strain. In addition, it does not bear any kind of branding which is a common practice among ransomware groups.
  • The ransomware is partly autonomous, carrying out tasks that are usually manually performed during enterprise-wide ransomware deployment, such as creating a domain group policy (GPO). In the past, similar functionality was linked to LockBit 2.0.
  • The ransomware is highly customizable and contains technically unique features, such as the use of direct syscalls, rarely observed in ransomware. Moreover, due to different implementation methods, Rorschach is one of the fastest ransomware observed, by the speed of encryption.
  • The ransomware was deployed using DLL side-loading of a Cortex XDR Dump Service Tool, a signed commercial security product, a loading method which is not commonly used to load ransomware. The vulnerability was properly reported to Palo Alto Networks.
checkpoint research EN 2023 Rorschach ransomware DLL side-loading Cortex XDR
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware https://research.checkpoint.com/2023/following-the-scent-of-trickgate-6-year-old-packer-used-to-deploy-the-most-wanted-malware/
02/02/2023 07:19:20
QRCode
archive.org
thumbnail
  • Initially observed in July 2016, TrickGate is a shellcode-based packer offered as a service to hide malware from EDRs and antivirus programs.
  • Over the last 6 years, TrickGate was used to deploy the top members of the “Most Wanted Malware” list, such as Cerber, Trickbot, Maze, Emotet, REvil, Cobalt Strike, AZORult, Formbook, AgentTesla and more.
  • TrickGate managed to stay under the radar for years because it is transformative – it undergoes changes periodically. This characteristic caused the research community to identify it by numerous attributes and names.
  • While the packer’s wrapper changed over time, the main building blocks within TrickGate shellcode are still in use today.
  • Check Point Threat Emulation successfully detects and blocks the TrickGate packer.
checkpoint EN 2023 TrickGate shellcode hide EDR Cerber Trickbot Maze Emotet REvil CobaltStrike AZORult Formbook AgentTesla
OPWNAI : Cybercriminals Starting to Use ChatGPT https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/
07/01/2023 11:11:03
QRCode
archive.org

At the end of November 2022, OpenAI released ChatGPT, the new interface for its Large Language Model (LLM), which instantly created a flurry of interest in AI and its possible uses. However, ChatGPT has also added some spice to the modern cyber threat landscape as it quickly became apparent that code generation can help less-skilled threat actors effortlessly launch cyberattacks.

In Check Point Research’s (CPR) previous blog, we described how ChatGPT successfully conducted a full infection flow, from creating a convincing spear-phishing email to running a reverse shell, capable of accepting commands in English. The question at hand is whether this is just a hypothetical threat or if there are already threat actors using OpenAI technologies for malicious purposes.

CPR’s analysis of several major underground hacking communities shows that there are already first instances of cybercriminals using OpenAI to develop malicious tools. As we suspected, some of the cases clearly showed that many cybercriminals using OpenAI have no development skills at all. Although the tools that we present in this report are pretty basic, it’s only a matter of time until more sophisticated threat actors enhance the way they use AI-based tools for bad.

checkpoint EN 2023 research deepweb OpenAI ChatGPT cybercriminals malicious tools
Check Point Research analyzes files on the Dark Web and finds millions of records available https://blog.checkpoint.com/2022/12/01/check-point-research-analyzes-files-on-the-dark-web-and-finds-millions-of-records-available/
13/12/2022 09:40:20
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) has analyzed the files that are for sale on the Dark Web, whose sellers claim are from WhatsApp users, revealing the leak includes 360 million phone numbers from 108 countries
  • Full list went on sale for 4 days, and is now being distributed freely amongst Dark Web users
  • Users are advised to be aware of links and unknown senders, while using any messaging services
checkpoint EN 2022 WhatsApp darkweb dump
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research https://research.checkpoint.com/2022/pulling-the-curtains-on-azov-ransomware-not-a-skidsware-but-polymorphic-wiper/
12/12/2022 21:34:32
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) provides under-the-hood details of its analysis of the infamous Azov Ransomware
  • Investigation shows that Azov is capable of modifying certain 64-bit executables to execute its own code
  • Azov is designed to inflict impeccable damage to the infected machine it runs on
  • CPR sees over 17K of Azov-related samples submitted to VirusTotal
checkpoint EN 2022 Azov analysis Ransomware
Bumblebee: increasing its capacity and evolving its TTPs https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
04/10/2022 19:49:59
QRCode
archive.org
thumbnail

The spring of 2022 saw a spike in activity of Bumblebee loader, a recent threat that has garnered a lot of attention due to its many links to several well-known malware families.

checkpoint EN 2022 Bumblebee loader malware Analysis
XLoader Botnet: Find Me If You Can https://research.checkpoint.com/2022/xloader-botnet-find-me-if-you-can/
01/06/2022 22:06:59
QRCode
archive.org
thumbnail

In July 2021, CPR released a series of three publications covering different aspects of how the Formbook and XLoader malware families function. We described how XLoader emerged in the Darknet community to fill the empty niche after Formbook sales were abruptly stopped by its author. We did a deep technical analysis followed by a description of XLoader for macOS along with common points and differences in how both malware families conceal the heart of the whole operation, the Command-and-Control (C&C) infrastructure. However, the world does not stand still, and this applies to the malware cyber-world as well.

checkpoint EN 2022 XLoader malware Research
New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft's Official Store https://research.checkpoint.com/2022/new-malware-capable-of-controlling-social-media-accounts-infects-5000-machines-and-is-actively-being-distributed-via-gaming-applications-on-microsofts-official-store/
26/02/2022 11:27:25
QRCode
archive.org
thumbnail

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

checkpoint 2022 Microsoft sore app electron socialmedia TempleRun backdoor games
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk https://research.checkpoint.com/2022/can-you-trust-a-files-digital-signature-new-zloader-campaign-exploits-microsofts-signature-verification-putting-users-at-risk/
15/02/2022 10:03:30
QRCode
archive.org
thumbnail

Last seen in August 2021, Zloader, a banking malware designed to steal user credentials and private information, is back with a simple yet sophisticated infection chain. Previous Zloader campaigns, which were seen in 2020, used malicious documents, adult sites and Google ads to infect systems.
Evidence of the new campaign was first seen around early November 2021. The techniques incorporated in the infection chain include the use of legitimate remote management software (RMM) to gain initial access to the target machine.

checkpoint EN Zloader Altera Antik.Corp research
page 2 / 2
4371 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio