Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-11-30Check PointItay Cohen
@online{cohen:20181130:evolution:045e447, author = {Itay Cohen}, title = {{The Evolution of BackSwap}}, date = {2018-11-30}, organization = {Check Point}, url = {https://research.checkpoint.com/the-evolution-of-backswap/}, language = {English}, urldate = {2020-01-10} } The Evolution of BackSwap
BackSwap
2018-10-17Check PointIsrael Gubi
@online{gubi:20181017:emergence:670b6fd, author = {Israel Gubi}, title = {{The Emergence of the New Azorult 3.3}}, date = {2018-10-17}, organization = {Check Point}, url = {https://research.checkpoint.com/the-emergence-of-the-new-azorult-3-3/}, language = {English}, urldate = {2020-01-07} } The Emergence of the New Azorult 3.3
Azorult
2018-10-14Check PointBen Herzog
@online{herzog:20181014:godzilla:0f2194a, author = {Ben Herzog}, title = {{Godzilla Loader and the Long Tail of Malware}}, date = {2018-10-14}, organization = {Check Point}, url = {https://research.checkpoint.com/godzilla-loader-and-the-long-tail-of-malware/}, language = {English}, urldate = {2020-01-09} } Godzilla Loader and the Long Tail of Malware
2018-08-20Check PointItay Cohen, Ben Herzog
@online{cohen:20180820:ryuk:5756495, author = {Itay Cohen and Ben Herzog}, title = {{Ryuk Ransomware: A Targeted Campaign Break-Down}}, date = {2018-08-20}, organization = {Check Point}, url = {https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/}, language = {English}, urldate = {2019-12-10} } Ryuk Ransomware: A Targeted Campaign Break-Down
Ryuk
2018-08-05Check PointAlexey Bukhteyev
@online{bukhteyev:20180805:ramnits:1268bad, author = {Alexey Bukhteyev}, title = {{Ramnit’s Network of Proxy Servers}}, date = {2018-08-05}, organization = {Check Point}, url = {https://research.checkpoint.com/ramnits-network-proxy-servers/}, language = {English}, urldate = {2020-01-09} } Ramnit’s Network of Proxy Servers
Ngioweb Ramnit
2018-07-24Check PointOfer Caspi, Ben Herzog
@online{caspi:20180724:emotet:a26725d, author = {Ofer Caspi and Ben Herzog}, title = {{Emotet: The Tricky Trojan that ‘Git Clones’}}, date = {2018-07-24}, organization = {Check Point}, url = {https://research.checkpoint.com/emotet-tricky-trojan-git-clones/}, language = {English}, urldate = {2020-01-13} } Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-08Check Point ResearchCheck Point Research
@online{research:20180708:attack:bc66648, author = {Check Point Research}, title = {{APT Attack In the Middle East: The Big Bang}}, date = {2018-07-08}, organization = {Check Point Research}, url = {https://research.checkpoint.com/apt-attack-middle-east-big-bang/}, language = {English}, urldate = {2020-01-08} } APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-06-12Check Point ResearchMark Lechtik
@online{lechtik:20180612:deep:67efc2c, author = {Mark Lechtik}, title = {{Deep Dive into UPAS Kit vs. Kronos}}, date = {2018-06-12}, organization = {Check Point Research}, url = {https://research.checkpoint.com/deep-dive-upas-kit-vs-kronos/}, language = {English}, urldate = {2020-01-07} } Deep Dive into UPAS Kit vs. Kronos
UPAS
2018-06-06Check PointCheck Point Research
@online{research:20180606:banking:97835c7, author = {Check Point Research}, title = {{Banking Trojans Under Development}}, date = {2018-06-06}, organization = {Check Point}, url = {https://research.checkpoint.com/banking-trojans-development/}, language = {English}, urldate = {2019-11-21} } Banking Trojans Under Development
Karius
2018-02-04Check PointMark Lechtik
@online{lechtik:20180204:dorkbot:7c9daf2, author = {Mark Lechtik}, title = {{DorkBot: An Investigation}}, date = {2018-02-04}, organization = {Check Point}, url = {https://research.checkpoint.com/dorkbot-an-investigation/}, language = {English}, urldate = {2020-01-09} } DorkBot: An Investigation
NgrBot
2018-01-12Check PointElena Root, Bogdan Melnykov
@online{root:20180112:malware:7f1793a, author = {Elena Root and Bogdan Melnykov}, title = {{Malware Displaying Porn Ads Discovered in Game Apps on Google Play}}, date = {2018-01-12}, organization = {Check Point}, url = {https://research.checkpoint.com/malware-displaying-porn-ads-discovered-in-game-apps-on-google-play/}, language = {English}, urldate = {2020-01-13} } Malware Displaying Porn Ads Discovered in Game Apps on Google Play
AdultSwine
2017-12Check PointStanislav Skuratovich, Neomi Rona
@online{skuratovich:201712:nine:f4ecc23, author = {Stanislav Skuratovich and Neomi Rona}, title = {{Nine circles of Cerber}}, date = {2017-12}, organization = {Check Point}, url = {https://www.virusbulletin.com/virusbulletin/2017/12/vb2017-paper-nine-circles-cerber/}, language = {English}, urldate = {2019-11-26} } Nine circles of Cerber
Cerber
2017-10-19Check PointCheck Point
@online{point:20171019:new:364e629, author = {Check Point}, title = {{A New IoT Botnet Storm is Coming}}, date = {2017-10-19}, organization = {Check Point}, url = {https://research.checkpoint.com/new-iot-botnet-storm-coming/}, language = {English}, urldate = {2019-12-10} } A New IoT Botnet Storm is Coming
IoT Reaper
2017-07-13Check PointOfer Caspi
@online{caspi:20170713:osxdok:b34ca60, author = {Ofer Caspi}, title = {{OSX/Dok Refuses to Go Away and It’s After Your Money}}, date = {2017-07-13}, organization = {Check Point}, url = {https://blog.checkpoint.com/2017/07/13/osxdok-refuses-go-away-money/}, language = {English}, urldate = {2020-01-05} } OSX/Dok Refuses to Go Away and It’s After Your Money
2017-06-01Check PointCheck Point
@online{point:20170601:fireball:7689185, author = {Check Point}, title = {{FIREBALL – The Chinese Malware of 250 Million Computers Infected}}, date = {2017-06-01}, organization = {Check Point}, url = {http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/}, language = {English}, urldate = {2020-01-08} } FIREBALL – The Chinese Malware of 250 Million Computers Infected
Fireball
2017-05-10Check PointCheck Point
@online{point:20170510:diamondfox:018fbdb, author = {Check Point}, title = {{DiamondFox modular malware – a one-stop shop}}, date = {2017-05-10}, organization = {Check Point}, url = {http://blog.checkpoint.com/2017/05/10/diamondfox-modular-malware-one-stop-shop/}, language = {English}, urldate = {2019-12-18} } DiamondFox modular malware – a one-stop shop
DiamondFox
2017-05-04Check Point Software Technologies LtdOfer Caspi
@online{caspi:20170504:osx:9f62c96, author = {Ofer Caspi}, title = {{OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic}}, date = {2017-05-04}, organization = {Check Point Software Technologies Ltd}, url = {http://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traffic/}, language = {English}, urldate = {2019-11-24} } OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic
Dok
2017-03-10Check PointCheck Point
@online{point:20170310:preinstalled:9cebe0f, author = {Check Point}, title = {{Preinstalled Malware Targeting Mobile Users}}, date = {2017-03-10}, organization = {Check Point}, url = {http://blog.checkpoint.com/2017/03/10/preinstalled-malware-targeting-mobile-users/}, language = {English}, urldate = {2019-12-18} } Preinstalled Malware Targeting Mobile Users
Loki
2017-01-24Check PointCheck Point
@online{point:20170124:charger:7ef6390, author = {Check Point}, title = {{Charger Malware Calls and Raises the Risk on Google Play}}, date = {2017-01-24}, organization = {Check Point}, url = {http://blog.checkpoint.com/2017/01/24/charger-malware/}, language = {English}, urldate = {2020-01-06} } Charger Malware Calls and Raises the Risk on Google Play
Charger
2016-07Check PointCheck Point
@techreport{point:201607:from:fc635c5, author = {Check Point}, title = {{From HummingBad to Worse}}, date = {2016-07}, institution = {Check Point}, url = {http://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf}, language = {English}, urldate = {2020-01-06} } From HummingBad to Worse
HummingBad