#CheckPointResearch

2025-05-20

🚨 New Threat Intelligence Report: May 19, 2025

Check Point Research's latest report highlights a 94% surge in weekly cyberattacks targeting telecommunications infrastructure in Q1 2025, driven by the growing reliance on 5G, AI, and automation.

Additionally, a sophisticated phishing campaign has been identified, using fake email quarantine alerts to steal credentials, with 32,000 malicious emails sent to over 6,000 customers.

Stay informed and protect your organization by reading the full report: research.checkpoint.com/2025/1

#CyberSecurity #ThreatIntel #CheckPointResearch #EmployeeAmbassadors #Phishing

2025-05-13

🚨 Cybersecurity Alert: Check Point Research's 12th May Threat Intelligence Report

Check Point Research's latest Threat Intelligence Report highlights significant cyber incidents from the past week including a UK-based education giant, a medical device manufacturer, an airline and more.

These incidents underscore the persistent threats across various sectors.

🔗 For a comprehensive overview, read the full report here: research.checkpoint.com/2025/1

#CyberSecurity #ThreatIntelligence #CheckPointResearch #DataBreach #CyberAttack #Infosec

2025-05-07

🔍 Stay Ahead of Emerging Cyber Threats

This week's Threat Intelligence Report from Check Point Research highlights significant cyber incidents affecting major organizations across healthcare, retail, and enterprise.

These incidents underscore the evolving threat landscape and the importance of robust cybersecurity measures.

📄 Read the full report: research.checkpoint.com/2025/5

#CyberSecurity #ThreatIntelligence #CheckPointResearch

2024-07-26

In my new blog for I propose a new injection technique, using the Thread Name API - check it out! 💙 : research.checkpoint.com/2024/t //

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-09-22

"🔐 BBTok Banking Malware Resurfaces with a Vengeance in LATAM 🌎"

Check Point Research (CPR) has unearthed a new variant of the BBTok banking malware actively targeting over 40 banks in Mexico and Brazil. Initially discovered in 2020, this variant mimics the interfaces of these banks, duping victims into divulging their 2FA codes or payment card details. The malware, now employing diversified infection chains for different Windows versions, showcases an evolution in the threat actor's tactics, notably utilizing multi-layered geo-fencing to ensure infections are localized to Mexico and Brazil. The malware's functionality extends to process enumeration, keyboard and mouse control, alongside classic banking Trojan features like simulating fake login pages. The campaign's sophistication underscores the need for heightened vigilance when entering banking credentials online.

Source: Check Point Blog

Tags: #BBTok #BankingMalware #CyberSecurity #LATAM #Phishing #2FA #CheckPointResearch #MalwareEvolution #GeoFencing 🏦🛡️🌐

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-09-19

"🎣 Massive Phishing Campaign Targets 40+ Colombian Companies 🇨🇴"

Recent findings from Check Point Research reveal a significant phishing attack aimed at over 40 renowned Colombian companies. The culprits sought to infect victims' systems with the infamous "Remcos" malware, a versatile Remote Access Trojan (RAT) granting attackers full control over compromised devices. This control facilitates various malicious deeds, such as data theft, additional malware installations, and user account hijacking.

Attack's Modus Operandi:
1️⃣ Fraudulent Email: Deceptive emails mimicking trusted entities like banks or Colombian firms, containing urgent messages or offers.
2️⃣ Email Attachment: Attachments in ZIP or RAR formats, purportedly holding vital documents.
3️⃣ Hidden Commands: Obfuscated Batch (BAT) files within the archives, running PowerShell commands to dodge security solutions.
4️⃣ Loading .NET Modules: Commands causing the victim's PC to load two essential components for the attack's subsequent stages.
5️⃣ Final Payload: Remcos RAT loaded into memory, granting attackers full control for malicious activities like unauthorized access, data theft, and remote surveillance.

The intricate technical research by Check Point Research delves into the attack's complexity, emphasizing evasion methods and deobfuscation procedures employed by the adversaries.

Source: Cyber Security News

Tags: #Phishing #Remcos #RAT #CyberSecurity #CheckPointResearch #ColombianCompanies 🎯🔒🖥️

deltatux :donor:deltatux@infosec.town
2023-07-31

#CheckPointResearch recently did an investigation into #Peloton's Internet connected gym equipment and found that it is susceptible to #cyberattacks.

A combination of outdated
#Android OS builds, USB debugging being left enabled & vulnerabilities in the bundled apps, malicious actors could gain unauthorized entry into the device and jeopardize user data.

#infosec #cybersecurity #iotsecurity

https://blog.checkpoint.com/security/is-your-peloton-attracting-security-threats/

2023-01-09

"Researchers at security firm Check Point Research reported Friday that within a few weeks of #ChatGPT going live, participants in cybercrime forums—some with little or no coding experience—were using it to write software and emails that could be used for espionage, #ransomware, malicious spam, and other malicious tasks."
#CheckPointResearch #AI #NLP #scriptkiddies #malware #phishing #CyberSecurity #CyberCrime
arstechnica.com/information-te

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst