Click here to download all references as Bib-File.
2023-09-20 ⋅ Check Point Research ⋅ Behind the Scenes of BBTok: Analyzing a Banker’s Server Side Components BBtok |
2023-07-03 ⋅ Check Point Research ⋅ Chinese Threat Actors Targeting Europe in SmugX Campaign PlugX SmugX |
2023-06-08 ⋅ Check Point Research ⋅ Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa Stealth Soldier |
2023-05-24 ⋅ Check Point Research ⋅ Agrius Deploys MoneyBird in Targeted Attacks against Israeli Organizations |
2023-05-22 ⋅ Check Point ⋅ Cloud-based Malware Delivery: The Evolution of GuLoader CloudEyE |
2023-05-16 ⋅ Check Point Research ⋅ The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant Horse Shell |
2023-05-04 ⋅ Check Point Research ⋅ Eastern Asian Android Assault - FluHorse FluHorse |
2023-05-01 ⋅ Check Point Research ⋅ Chain Reaction: RokRAT's Missing Link Amadey RokRAT |
2023-04-18 ⋅ Check Point Research ⋅ Raspberry Robin: Anti-Evasion How-To & Exploit Analysis Raspberry Robin |
2023-04-10 ⋅ Check Point ⋅ March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files Agent Tesla CloudEyE Emotet Formbook Nanocore RAT NjRAT QakBot Remcos Tofsee |
2023-04-04 ⋅ Check Point Research ⋅ Rorschach – A New Sophisticated and Fast Ransomware Rorschach Ransomware |
2023-03-27 ⋅ Check Point Research ⋅ Rhadamanthys: The “Everything Bagel” Infostealer Rhadamanthys |
2023-03-15 ⋅ Check Point Research ⋅ DotRunPEX - Demystifying New Virtualized .NET Injector used in the Wild |
2023-03-14 ⋅ Check Point Research ⋅ South Korean Android Banking Menace - Fakecalls Fakecalls |
2023-03-07 ⋅ Check Point Research ⋅ Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities 5.t Downloader 8.t Dropper Soul |
2023-02-16 ⋅ Check Point Research ⋅ Operation Silent Watch: Desktop Surveillance in Azerbaijan and Armenia OxtaRAT |
2023-01-06 ⋅ Check Point ⋅ OpwnAI: Cybercriminals Starting to use ChatGPT |
2022-12-15 ⋅ Check Point Research ⋅ Mobile #AlienBot malware starts utilizing an incorporated DGA module Alien |
2022-10-03 ⋅ Check Point ⋅ Bumblebee: increasing its capacity and evolving its TTPs BumbleBee Cobalt Strike Meterpreter Sliver Vidar |
2022-09-22 ⋅ Check Point ⋅ 7 Years of Scarlet Mimic’s Mobile Surveillance Campaign Targeting Uyghurs MobileOrder |