Check Point Research

Thread Name-Calling: Using Thread Name for Offense

Process Injection is a vital technique used by attackers to evade detection and escalate privileges. Thread Name-Calling has emerged as a new injection technique that abuses Windows APIs for thread descriptions to bypass endpoint protection products.

Fraudsters Abuse Legitimate Blockchain Protocols to Steal Your Cryptocurrency Wallet

Research conducted by Check Point has revealed how fraudsters are exploiting legitimate blockchain protocols to carry out sophisticated scams. The Uniswap Protocol and Safe.global are among the platforms targeted by these attackers.

New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns

The deployment of BugSleep is a significant development in MuddyWater's tactics, targeting various sectors with phishing emails leading to the distribution of Remote Management Tools and the BugSleep malware.

Exploring Compiled V8 JavaScript Usage in Malware

Compiled V8 JavaScript in Google's engine converts JavaScript into low-level bytecode, making analysis and detection difficult. Attacks using this bytecode ensure compatibility with the V8 engine for successful execution.

Rafel RAT, Android Malware from Espionage to Ransomware Operations

Check Point Research has identified multiple threat actors using Rafel RAT, including an espionage group. The tool's features, such as remote access and surveillance, make it effective for covert operations and infiltrating high-value targets.

Attackers Increasingly Leverage BoxedApp Products for Malware Delivery

BoxedApp products have been commercially available for some time, but in the past year, there has been a notable increase in their abuse to deploy malware, particularly related to RATs and stealers.

Static Unpacking for the Widespread NSIS-based Malicious Packer Family

Researchers analyzed a widespread malicious packer family based on the Nullsoft Scriptable Install System (NSIS) that is used to protect various types of malware, including loaders, stealers, and Remote Access Trojans (RATs).

Sharp Dragon Expands Towards Africa and The Caribbean

The threat actors demonstrate increased caution in selecting their targets, broadening their reconnaissance efforts, and adopting Cobalt Strike Beacon over custom backdoors.

Void Manticore Launches Destructive Attacks on Albania and Israel

Void Manticore utilizes five different methods to conduct disruptive operations against its victims. This includes several custom wipers for both Windows and Linux, alongside manual deletion of files and shared drives.

Agent Tesla Targeting United States and Australia

On the 7th of November 2023, an Agent Tesla campaign started against Australian organizations, and the same actor performed another campaign targeting mainly Australian entities.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags