Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-17Check Point Software Technologies LtdCheck Point Research
Malware Spotlight – Into the Trash: Analyzing LitterDrifter
LitterDrifter
2023-10-31Check Point ResearchCheck Point Research
From Albania to the Middle East: The Scarred Manticore is Listening
Tunna LIONTAIL Scarred Manticore
2023-10-30Check Point ResearchCheck Point
Evolving Cyber Dynamics Amidst the Israel-Hamas Conflict
SYLHET GANG-SG
2023-09-20Check Point ResearchCheckpoint Research
Behind the Scenes of BBTok: Analyzing a Banker’s Server Side Components
BBtok
2023-07-03Check Point ResearchCheckpoint Research
Chinese Threat Actors Targeting Europe in SmugX Campaign
DOPLUGS SmugX
2023-06-08Check Point ResearchCheckpoint Research
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa
Stealth Soldier
2023-05-24Check Point ResearchJiri Vinopal, Marc Salinas Fernandez
Agrius Deploys MoneyBird in Targeted Attacks against Israeli Organizations
Pink Sandstorm
2023-05-22Check PointAlexey Bukhteyev, Arie Olshtein
Cloud-based Malware Delivery: The Evolution of GuLoader
CloudEyE
2023-05-16Check Point ResearchItay Cohen, Radoslaw Madej
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant
Horse Shell Camaro Dragon
2023-05-04Check Point ResearchAlex Shamshur, Raman Ladutska, Sam Handelman
Eastern Asian Android Assault - FluHorse
FluHorse
2023-05-01Check Point ResearchCheck Point Research
Chain Reaction: RokRAT's Missing Link
Amadey RokRAT
2023-04-18Check Point ResearchShavit Yosef
Raspberry Robin: Anti-Evasion How-To & Exploit Analysis
Raspberry Robin
2023-04-10Check PointCheck Point
March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files
Agent Tesla CloudEyE Emotet Formbook Nanocore RAT NjRAT QakBot Remcos Tofsee
2023-04-04Check Point ResearchJiří Vinopal
Rorschach – A New Sophisticated and Fast Ransomware
Rorschach Ransomware
2023-03-27Check Point ResearchCheckpoint Research
Rhadamanthys: The “Everything Bagel” Infostealer
Rhadamanthys
2023-03-15Check Point ResearchJiří Vinopal
DotRunPEX - Demystifying New Virtualized .NET Injector used in the Wild
2023-03-14Check Point ResearchBohdan Melnykov, Raman Ladutska
South Korean Android Banking Menace - Fakecalls
Fakecalls
2023-03-07Check Point ResearchCheck Point Research
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities
5.t Downloader 8.t Dropper Soul
2023-02-16Check Point ResearchCheck Point Research, Checkpoint
Operation Silent Watch: Desktop Surveillance in Azerbaijan and Armenia
OxtaRAT
2023-01-06Check PointCheck Point
OpwnAI: Cybercriminals Starting to use ChatGPT