Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-08Check Point ResearchCheck Point Research
@online{research:20200608:guloader:1f5e7ae, author = {Check Point Research}, title = {{GuLoader? No, CloudEyE.}}, date = {2020-06-08}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/guloader-cloudeye/}, language = {English}, urldate = {2020-06-11} } GuLoader? No, CloudEyE.
CloudEyE
2020-05-07CheckpointCheck Point Research
@online{research:20200507:naikon:7449e41, author = {Check Point Research}, title = {{Naikon APT: Cyber Espionage Reloaded}}, date = {2020-05-07}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/naikon-apt-cyber-espionage-reloaded/}, language = {English}, urldate = {2020-05-07} } Naikon APT: Cyber Espionage Reloaded
Aria-body
2020-05-05CheckpointCheck Point Research
@online{research:20200505:nazar:a4d2c7c, author = {Check Point Research}, title = {{Nazar: Spirits of the Past}}, date = {2020-05-05}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/nazar-spirits-of-the-past/}, language = {English}, urldate = {2020-05-05} } Nazar: Spirits of the Past
EYService
2020-04-10Check Point ResearchCheck Point Research
@online{research:20200410:threat:cca3f85, author = {Check Point Research}, title = {{Threat Actors Migrating to the Cloud}}, date = {2020-04-10}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/threat-actors-migrating-to-the-cloud/}, language = {English}, urldate = {2020-04-13} } Threat Actors Migrating to the Cloud
2020-03-12Check Point ResearchCheck Point
@online{point:20200312:vicious:1d97e93, author = {Check Point}, title = {{Vicious Panda: The COVID Campaign}}, date = {2020-03-12}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign}, language = {English}, urldate = {2022-07-25} } Vicious Panda: The COVID Campaign
8.t Dropper Vicious Panda
2020-03-12Check PointCheck Point Research
@online{research:20200312:vicious:3218bb8, author = {Check Point Research}, title = {{Vicious Panda: The COVID Campaign}}, date = {2020-03-12}, organization = {Check Point}, url = {https://research.checkpoint.com/2020/vicious-panda-the-covid-campaign/}, language = {English}, urldate = {2020-03-13} } Vicious Panda: The COVID Campaign
8.t Dropper BYEBY Enfal Korlia Poison Ivy
2020-02-16Check Point ResearchCheck Point Research
@online{research:20200216:hamas:c7c85d6, author = {Check Point Research}, title = {{Hamas Android Malware On IDF Soldiers-This is How it Happened}}, date = {2020-02-16}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/}, language = {English}, urldate = {2020-02-25} } Hamas Android Malware On IDF Soldiers-This is How it Happened
Unidentified APK 004
2020-02-03Check Point ResearchYaroslav Harakhavik
@online{harakhavik:20200203:warzone:18606cf, author = {Yaroslav Harakhavik}, title = {{Warzone: Behind the enemy lines}}, date = {2020-02-03}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2020/warzone-behind-the-enemy-lines/}, language = {English}, urldate = {2020-02-03} } Warzone: Behind the enemy lines
Ave Maria
2019-12-03Twitter (@_CPResearch_)Check Point Research
@online{research:20191203:afrodita:8c3d9fc, author = {Check Point Research}, title = {{Tweet on Afrodita Ransomware}}, date = {2019-12-03}, organization = {Twitter (@_CPResearch_)}, url = {https://twitter.com/_CPResearch_/status/1201957880909484033}, language = {English}, urldate = {2020-01-07} } Tweet on Afrodita Ransomware
Afrodita
2019-09-22Check Point ResearchCheck Point Research
@online{research:20190922:rancor:e834f67, author = {Check Point Research}, title = {{Rancor: The Year of The Phish}}, date = {2019-09-22}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2019/rancor-the-year-of-the-phish/}, language = {English}, urldate = {2020-03-04} } Rancor: The Year of The Phish
8.t Dropper Cobalt Strike
2019-07-10Check Point ResearchCheckpoint Research
@online{research:20190710:agent:2cb01b6, author = {Checkpoint Research}, title = {{Agent Smith: A New Species of Mobile Malware}}, date = {2019-07-10}, organization = {Check Point Research}, url = {https://research.checkpoint.com/2019/agent-smith-a-new-species-of-mobile-malware/}, language = {English}, urldate = {2023-06-06} } Agent Smith: A New Species of Mobile Malware
Agent Smith
2019-04-24Check Point ResearchItay Cohen
@online{cohen:20190424:deobfuscating:581c86e, author = {Itay Cohen}, title = {{Deobfuscating APT32 Flow Graphs with Cutter and Radare2}}, date = {2019-04-24}, organization = {Check Point Research}, url = {https://research.checkpoint.com/deobfuscating-apt32-flow-graphs-with-cutter-and-radare2/}, language = {English}, urldate = {2020-05-06} } Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-10Check PointCheck Point Research
@online{research:20190410:muddy:b75ef4a, author = {Check Point Research}, title = {{The Muddy Waters of APT Attacks}}, date = {2019-04-10}, organization = {Check Point}, url = {https://research.checkpoint.com/2019/the-muddy-waters-of-apt-attacks/}, language = {English}, urldate = {2023-07-10} } The Muddy Waters of APT Attacks
POWERSTATS
2019-02-19Check Point ResearchCheck Point
@online{point:20190219:north:2d1cfbe, author = {Check Point}, title = {{North Korea Turns Against New Targets?!}}, date = {2019-02-19}, organization = {Check Point Research}, url = {https://research.checkpoint.com/north-korea-turns-against-russian-targets/}, language = {English}, urldate = {2019-10-21} } North Korea Turns Against New Targets?!
KEYMARBLE
2018-12-02Check PointCheck Point Research
@online{research:20181202:ransomware:193f7d3, author = {Check Point Research}, title = {{The Ransomware Doctor Without A Cure}}, date = {2018-12-02}, organization = {Check Point}, url = {https://research.checkpoint.com/2018/the-ransomware-doctor-without-a-cure/}, language = {English}, urldate = {2023-06-01} } The Ransomware Doctor Without A Cure
Dharma
2018-07-08Check Point ResearchCheck Point Research
@online{research:20180708:attack:bc66648, author = {Check Point Research}, title = {{APT Attack In the Middle East: The Big Bang}}, date = {2018-07-08}, organization = {Check Point Research}, url = {https://research.checkpoint.com/apt-attack-middle-east-big-bang/}, language = {English}, urldate = {2020-01-08} } APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-06-12Check Point ResearchMark Lechtik
@online{lechtik:20180612:deep:67efc2c, author = {Mark Lechtik}, title = {{Deep Dive into UPAS Kit vs. Kronos}}, date = {2018-06-12}, organization = {Check Point Research}, url = {https://research.checkpoint.com/deep-dive-upas-kit-vs-kronos/}, language = {English}, urldate = {2020-01-07} } Deep Dive into UPAS Kit vs. Kronos
UPAS
2018-06-06Check PointCheck Point Research
@online{research:20180606:banking:97835c7, author = {Check Point Research}, title = {{Banking Trojans Under Development}}, date = {2018-06-06}, organization = {Check Point}, url = {https://research.checkpoint.com/banking-trojans-development/}, language = {English}, urldate = {2019-11-21} } Banking Trojans Under Development
Karius
2015-03-31Check Point ResearchCheck Point Research
@online{research:20150331:volatile:416807b, author = {Check Point Research}, title = {{Volatile Cedar - Analysis of a Global Cyber Espionage Campaign}}, date = {2015-03-31}, organization = {Check Point Research}, url = {https://blog.checkpoint.com/2015/03/31/volatilecedar/}, language = {English}, urldate = {2020-04-06} } Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar