Click here to download all references as Bib-File.
2021-06-02 ⋅ Check Point Research ⋅ SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor SharpPanda |
2021-05-27 ⋅ Check Point ⋅ Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations - Check Point Research |
2021-04-08 ⋅ Checkpoint ⋅ Iran’s APT34 Returns with an Updated Arsenal DNSpionage SideTwist TONEDEAF |
2021-04-07 ⋅ Check Point Research ⋅ New Wormable Android Malware Spreads by Creating Auto-Replies to Messages in WhatsApp |
2021-03-11 ⋅ Check Point Research ⋅ Playing in the (Windows) Sandbox |
2021-03-09 ⋅ Check Point Research ⋅ Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT Alien |
2021-02-22 ⋅ Check Point Research ⋅ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day |
2021-02-22 ⋅ Check Point Research ⋅ The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day APT31 |
2021-02-16 ⋅ Check Point ⋅ ApoMacroSploit: Apocalyptical FUD race BitRAT |
2021-02-08 ⋅ Checkpoint ⋅ Domestic Kitten – An Inside Look at the Iranian Surveillance Operations FurBall |
2021-01-04 ⋅ Check Point ⋅ DRIDEX Stopping Serial Killer: Catching the Next Strike Dridex |
2020-12-22 ⋅ Checkpoint ⋅ SUNBURST, TEARDROP and the NetSec New Normal SUNBURST TEARDROP |
2020-12-03 ⋅ Check Point Research ⋅ Vulnerability in Google Play Core Library Remains Unpatched in Google Play Applications |
2020-11-26 ⋅ Checkpoint ⋅ Bandook: Signed & Delivered Bandook |
2020-11-06 ⋅ Checkpoint ⋅ Ransomware Alert: Pay2Key Pay2Key |
2020-10-02 ⋅ Check Point Research ⋅ Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints |
2020-09-20 ⋅ Check Point Research ⋅ Rampant Kitten – An Iranian Espionage Campaign HookInjEx TelAndExt TelB |
2020-08-28 ⋅ Checkpoint ⋅ Gozi: The Malware with a Thousand Faces DreamBot ISFB LOLSnif SaiGon |
2020-06-25 ⋅ Check Point Research ⋅ DarkCrewBot – The Return of the Bot Shop Crew |
2020-06-18 ⋅ Check Point ⋅ Office 365 Phishing Campaign Exploits Samsung, Adobe and Oxford Servers |