CHKP Check Point Software Technologies Ltd.

Check Point Research: COVID-19 Pandemic Drives Criminal and Political Cyber-attacks Across Networks, Cloud and Mobile in H1 2020

Check Point Research: COVID-19 Pandemic Drives Criminal and Political Cyber-attacks Across Networks, Cloud and Mobile in H1 2020

’Cyber Attack Trends: 2020 Mid-Year Report’ reveals how criminals have targeted all sectors with pandemic-themed attacks, and highlights surge in nation-state cyber activity

SAN CARLOS, Calif., July 22, 2020 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, today released its ’’, which shows how criminal, political and nation-state threat actors have exploited the COVID-19 pandemic and related themes to target organizations across all sectors, including governments, industry, healthcare, service providers, critical infrastructure and consumers.

COVID-19 related phishing and malware attacks increased dramatically from under 5,000 thousand per week in February, to over 200,000 per week in late April. Also, in May and June, as countries started to ease lockdowns, threat actors also stepped up their non COVID-19 related exploits, resulting in a 34% increase in all types of cyber-attacks globally at the end of June compared to March and April. 

Key trends revealed in the report include:

  • Cyber warfare escalates: nation-state cyber-attacks surged in intensity and severity in H1 as countries sought to gather intelligence on or disrupt rivals’ handling of the pandemic. This extended to targeting healthcare and humanitarian organizations such as the WHO, which in attacks. 
  • Double-extortion attacks: In 2020, a new form of ransomware attack has become widely-used in which the attackers exfiltrate large quantities of data prior to encrypting it. Victims who refuse to pay the ransom  are threatened with the data being leaked, putting additional pressure on them to meet the criminals’ demands.
  • Mobile exploits: threat actors have been seeking new mobile infection vectors, improving their techniques to bypass security protections and place malicious apps in official application stores. In another , threat actors used a large international corporation’s Mobile Device Management (MDM) system to distribute malware to more than 75% of its managed mobile devices.
  • Cloud exposure:  The rapid move to public clouds during the pandemic has led to an increase in attacks targeting sensitive cloud workloads and data.   Threat actors are also using cloud infrastructure to used in their malware attacks.  In January, Check Point researchers found an industry-first in Microsoft Azure which would have allowed hackers to compromise data and apps of other Azure tenants, showing that public clouds are not inherently secure.

“The global response to the pandemic has transformed and accelerated threat actors’ business-as-usual models of attacks during the first half of this year, exploiting fears around COVID-19 as cover for their activities. We have also seen major new vulnerabilities and attack vectors emerging, which threaten the security of organizations across every sector,”  said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point.  “Security experts need to be aware of these rapidly evolving threats so that they can ensure their organizations have with the best level of protection possible during the rest of 2020.”

The most common malware variants during H1 2020 were: 

Top malware overall during H1 2020

  1. Emotet (impacting 9% of organizations globally) – Emotet is an advanced, self-propagating and modular Trojan. Emotet was originally a banking Trojan, but recently has been used as a distributer of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection.  In addition, it can also be spread through phishing spam emails containing malicious attachments or links.
  2. XMRig (8%) - XMRig is open-source CPU mining software used to mine the Monero cryptocurrency. Threat actors often abuse this open-source software by integrating it into their malware to conduct illegal mining on victims’ devices.
  3. Agent Tesla (7%) - AgentTesla is an advanced remote access trojan (RAT) which functions as a keylogger and password stealer and has been active since 2014. AgentTesla can monitor and collect the victim's keyboard input and system clipboard and can record screenshots and exfiltrate credentials for a variety of software installed on a victim's machine (including Google Chrome, Mozilla Firefox and Microsoft Outlook email client). AgentTesla is sold on various online markets and hacking forums.

 Top cryptominers during H1 2020

  1. XMRig (responsible for 46% of all cryptomining activity globally) - XMRig is open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild in May 2017. Threat actors often abuse this open-source software by integrating it into their malware to conduct illegal mining on victims’ devices.
  2. Jsecoin (28%) - Web-based Crypto miner designed to perform unauthorized online mining of Monero cryptocurrency when a user visits a particular web page. The implanted JavaScript uses a large amount of the computational resources of the end-user’s machines to mine coins, thus impacting the performance of the system. JSEcoin stopped its activity in April 2020.
  3. Wannamine (6%) - WannaMine is a sophisticated Monero crypto-mining worm that spreads the EternalBlue exploit. WannaMine implements a spreading mechanism and persistence techniques by leveraging the Windows Management Instrumentation (WMI) permanent event subscriptions.

 Top mobile malware during H1 2020

  1. xHelper (responsible for 24% of all mobile malware attacks) - xHelper is an Android malware which mainly shows intrusive popup ads and notification spam. It is very hard to remove once installed due to its reinstallation capabilities. First observed in March 2019, xHelper has infected more than 45,000 devices.
  2. PreAMo (19%) - PreAMo is a clicker malware for Android devices, first reported in April 2019. PreAMo generates revenue by mimicking the user and clicking on ads without the user's knowledge. Discovered on Google Play, the malware was downloaded over 90 million times across six different mobile applications.
  3. Necro (14%) - Necro is an Android Trojan Dropper. It can download other malware, show intrusive ads, and fraudulently charge for paid subscriptions.

Top banking malware during H1 2020

  1. Dridex (responsible for 27% of all banking malware attacks) - Dridex is a Banking Trojan that targets Windows PCs. It is delivered by spam campaigns and Exploit Kits, and relies on WebInjects to intercept and redirect banking credentials to an attacker-controlled server. Dridex contacts a remote server, sends information about the infected system, and can also download and execute additional modules for remote control.
  2. Trickbot (20%) - Trickbot is a modular Banking Trojan that targets the Windows platform, and is mostly delivered via spam campaigns or other malware families such as Emotet.
  3. Ramnit (15%) - Ramnit is a modular banking Trojan first discovered in 2010. Ramnit steals web session information, giving its operators the ability to steal account credentials for all services used by the victim, including bank accounts, and corporate and social networks accounts.

The ’Cyber Attack Trends: Annual Report 2020 H1’ gives a detailed overview of the cyber-threat landscape. These findings are based on data drawn from Check Point’s ThreatCloud intelligence between January and June 2020, highlighting the key tactics cyber-criminals are using to attack businesses. A full copy of the report is available from .

Follow Check Point Research via:

Blog:

Twitter:

Podcast:

Facebook:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:  INVESTOR CONTACT:
Jacinta Paul  Kip E. Meintzer
Check Point Software Technologies  Check Point Software Technologies
  

EN
22/07/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd: 3 directors

Three Directors at Check Point Software Technologies Ltd sold 1,314,352 shares at between 218.330USD and 220.000USD. The significance rating of the trade was 100/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the...

Wedbush Research
  • Wedbush Research
DPZ DOMINO'S PIZZA INC.
SHAK SHAKE SHACK INC. CLASS A
DEI DOUGLAS EMMETT INC
HPP HUDSON PACIFIC PROPERTIES INC.
XENE XENON PHARMACEUTICALS INC
WING WINGSTOP INC.
WEN WENDY'S COMPANY
WDC WESTERN DIGITAL CORPORATION
VYGR VOYAGER THERAPEUTICS INC.
TXRH TEXAS ROADHOUSE INC.
TSLA TESLA INC
TRNO TERRENO REALTY CORPORATION
STKS ONE GROUP HOSPITALITY
STAG STAG INDUSTRIAL INC.
SIMON SILICON MOTION TECHNOLOGY CORPORATION SPONSORED ADR
SBUX STARBUCKS CORPORATION
PZZA PAPA JOHN'S INTERNATIONAL INC.
PEGA PEGASYSTEMS INC.
OFC CORPORATE OFFICE PROPERTIES TRUST
MCD MCDONALD'S CORPORATION
JACK JACK IN THE BOX INC.
IMAX IMAX CORPORATION
EGP EASTGROUP PROPERTIES INC.
EAT BRINKER INTERNATIONAL INC.
DIN DINE BRANDS GLOBAL INC.
DENN DENNY'S CORPORATION
CTMX CYTOMX THERAPEUTICS INC.
CHKP CHECK POINT SOFTWARE TECHNOLOGIES LTD.
CAKE CHEESECAKE FACTORY INCORPORATED
BXP BOSTON PROPERTIES INC.
BIIB BIOGEN INC.
ARDX ARDELYX INC
BJRI BJ'S RESTAURANTS INC.
FRX_CN FENNEC PHARMACEUTICALS
CMG CHIPOTLE MEXICAN GRILL INC.
DRI DARDEN RESTAURANTS INC.
WVE WAVE LIFE SCIENCES
PLYM PLYMOUTH INDUSTRIAL REIT INC.
MRSN MERSANA THERAPEUTICS
ISR ISORAY
AMZN AMAZON.COM INC.
AAPL APPLE INC.
RCKT ROCKET PHARMACEUTICALS
MSFT MICROSOFT CORPORATION
IBM INTERNATIONAL BUSINESS MACHINES CORPORATION
APLS APELLIS PHARMACEUTICALS
SRRK SCHOLAR ROCK HOLDING CORPORATION
YMAB Y-MABS THERAPEUTICS
TVTX TRAVERE THERAPEUTICS INC
PLTK PLAYTIKA HOLDING
RBLX ROBLOX
TNGX TANGO THERAPEUTICS
VERA INC
BROS VERA THERAPEUTICS INC
STRW DUTCH BROS INC
CAVA STRAWBERRY FIELDS REIT INC.
JBIO CAVA GROUP INC
JADE BIOSCIENCES
INC.
 PRESS RELEASE

Check Point Software Technologies Receives Common Criteria EAL4+ Certi...

Check Point Software Technologies Receives Common Criteria EAL4+ Certification for Quantum Firewall Software R82 Certification expands global assurance for Check Point’s security platform, supporting trusted deployment in high-assurance environments across more than 30 nations REDWOOD CITY, Calif., May 01, 2025 (GLOBE NEWSWIRE) -- . (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that its Quantum Firewall Software R82, the latest version of Check Point’s core network security software delivering advanced threat prevention and scalable policy mana...

 PRESS RELEASE

Check Point Research Launches AI Security Report: Exposing the Rise of...

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses New report unveils four key AI-driven cyber threats and how organizations can outsmart attackers in an AI-driven world SAN FRANCISCO, April 30, 2025 (GLOBE NEWSWIRE) -- RSA CONFERENCE, – (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural at RSA Conference 2025. This report offers an in-depth exploration of how cyber criminals are weaponizing artificial intelligence (AI), alongside strategic insights for defenders to stay ahead. A...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch