Check Point experts prepared a Global Threat Index report on the most active threats in August 2019. Analysts note the activity of the Echobot botnet – it launched large-scale attacks on iOT devices, as well as the “return to life” of the Emotet botnet. In a report, a research team warns of a new variation of the Mirai botnet – …Read More »
Tag Archives: Check Point
Check Point analysts found six vulnerabilities in the implementation of the Picture Transfer Protocol (PTP) used in Canon cameras. The exploitation of these problems ultimately enables intercepting control over the device and allows the attacker to install any malware on the DSLR (including “over the air” path if the camera supports wireless connections). “Our research shows how an attacker in …Read More »
The Microsoft Management Console (MMC), used by system administrators to configure and track system performance, contains a number of vulnerabilities, using which attackers can implement malware or intercept control on the attacked machine. The vulnerability group, which includes XSS and XXE bugs, received a common identifier CVE-2019-0948. Attackers can exploit problems using the snap-in mechanism in the MMC. Snap-ins are …Read More »
Russian-speaking cybercriminals committed a series of fishing attacks on embassies of European counties.
Cybercriminals attacked embassies of European countries in Italia, Liberia, Kenia and other countries after sending its employees fishing letters. As report Check Point researchers, malware letters contained Microsoft Excel documents with headings «Military Financing Program» and “top secret” mark. After activation of malware’s macros from the document were extracted two files. In particular, on the attacked system was downloaded malware …Read More »
Microsoft published details of Windows-managed attacks on computers in media companies that took place in March. In the attacks, criminals utilized famous WinRAR vulnerability that gained popularity within criminal groups in the latest months. Hackers armed themselves with it immediately after publication by Check Point company, on February 20. That time researchers demonstrated how through this vulnerability code with the …Read More »