CHKP Check Point Software Technologies Ltd.

Check Point Research: From Supply Chain to Email, Mobile and the Cloud, No Environment is Immune to Cyber Attacks

Check Point Research: From Supply Chain to Email, Mobile and the Cloud, No Environment is Immune to Cyber Attacks

With 50% increase in attacks from 2018, Check Point’s “Cyber Attack Trends: 2019 Mid-Year Report” also reveals banking malware has evolved to become a very common mobile threat

SAN CARLOS, Calif., July 25, 2019 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, today released its “Cyber Attack Trends: 2019 Mid-Year Report”, revealing that no environment is immune to cyber-attacks. Threat actors continue to develop new tool sets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party supplier applications and even popular mail platforms:

  • Mobile banking: With over 50% increase in attacks when compared to 2018, banking malware has evolved to become a very common mobile threat. Today, banking malware is capable of stealing payment data, credentials and funds from victims’ bank accounts, and new versions of these malware are ready for massive distribution by anyone that’s willing to pay.



  • Software supply chain attacks: Threat actors are extending their attack vectors such as focusing on the supply chain. In software supply chain attacks, the threat actor typically instils a malicious code into legitimate software, by modifying and infecting one of the building blocks the software relies upon.



  • Email: Email scammers have started to employ various evasion techniques designed to bypass security solutions and anti-spam filters such as encoded emails, images of the message embedded in the email body, as well as complex which mixes plain text letters with HTML characters. Additional methods allowing scammers to remain under the radar of Anti-Spam filters and reaching targets’ inbox include social engineering techniques, as well as varying and personalizing email content.
  • Cloud: The growing popularity of public cloud environments has led to an increase in cyber-attacks targeting enormous resources and sensitive data residing within these platforms. The lack of security practices such as misconfiguration and poor management of the cloud resources, remains the most prominent threat to the cloud ecosystem in 2019, subjecting cloud assets to a wide array of attacks.

“Be it cloud, mobile or email, no environment is immune to cyber attacks. In addition, threats such as targeted Ransomware attacks, DNS attacks and Cryptominers will continue to be relevant in 2019, and security experts need to stay attuned to the latest threats and attack methods to provide their organizations with the best level of protection,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point.

Top Botnet Malware During H1 2019

  1. Emotet (29%) – Emotet is an advanced, self-propagate and modular Trojan. Emotet once used to employ as a banking Trojan, and recently is used as a distributer to other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection.  In addition, it can also be spread through phishing spam emails containing malicious attachments or links.
  2. Dorkbot (18%) – IRC-based Worm designed to allow remote code execution by its operator, as well as the download of additional malware to the infected system, with the primary motivation being to steal sensitive information and launch denial-of-service attacks.
  3. Trickbot (11%) – Trickbot is a Dyre variant that emerged in October 2016. Since its first appearance, it has been targeting banks mostly in Australia and the U.K, and lately it has started appearing also in India, Singapore and Malesia.    

Top Cryptominers During H1 2019

  1. Coinhive (23%) – A cryptominer designed to perform online mining of the Monero cryptocurrency without the user's approval when a user visits a web page.  Coinhive only emerged in September 2017 but has hit 12% of organizations worldwide hit by it.
  2. Cryptoloot (22%) – A JavaScript Cryptominer, designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's approval.
  3. XMRig (20%) – XMRig is open-source CPU mining software used for the mining process of the Monero cryptocurrency, and first seen in-the-wild on May 2017.

Top Mobile Malware During H1 2019

  1. Triada (30%) – A Modular Backdoor for Android which grants superuser privileges to downloaded malware, as it helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser.
  2. Lotoor (11%) – Lotoor is a hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges on compromised mobile devices.
  3. Hidad (7%) – Android malware which repackages legitimate apps and then releases them to a third-party store. It is able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.

Top Banking Malware During H1 2019

  1. Ramnit (28%) – A banking Trojan that steals banking credentials, FTP passwords, session cookies and personal data.
  2. Trickbot (21%) – Trickbot is a Dyre variant that emerged in October 2016. Since its first appearance, it has been targeting banks mostly in Australia and the U.K, and lately it has started appearing also in India, Singapore and Malesia.
  3. Ursnif (10%) – Ursnif is Trojan that targets the Windows platform. It is usually spread through exploit kits - Angler and Rig, each at its time. It has the capability to steal information related to Verifone Point-of-Sale (POS) payment software. It contacts a remote server to upload collected information and receive instructions. Moreover, it downloads files on the infected system and executes them.

The “Cyber Attack Trends: Annual Report 2019 1H” gives a detailed overview of the cyber-threat landscape. These findings are based on data drawn from Check Point’s ThreatCloud intelligence between January and June 2019, highlighting the key tactics cyber-criminals are using to attack businesses. A full copy of the report is available from .

Follow Check Point via:

Twitter: 

Facebook: 

Blog:

YouTube: 

LinkedIn: 

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and  mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

INVESTOR CONTACT:MEDIA CONTACT:
Kip E. MeintzerEkram Ahmed
Check Point Software TechnologiesCheck Point Software Technologies
+1.650.628.2040+ 1 650.628.2082

 

EN
25/07/2019

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd: 3 directors

Three Directors at Check Point Software Technologies Ltd sold 544 shares at 171.480USD. The significance rating of the trade was 53/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the company's directors over the ...

 PRESS RELEASE

Check Point Software Earns Leader & Fast Mover Position in GigaOm Rada...

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security Analyst firm highlights Check Point’s prevention-first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, Calif., Feb. 17, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been named a Leader and Fast Mover in the GigaOm Radar for Cloud Network Security 2025, marking the company’s third consecutive year in the top position. GigaOm recogniz...

Anish Jog ... (+4)
  • Anish Jog
  • Daniel Ives
  • Sam Brandeis
  • Steven Wahrhaftig

Good Results With a Key Few Quarters Ahead; Positive Mojo-PT to $210

A Closer Look at FY4Q25 (December) ResultsRevenueTotal revenue of $744.9 million (up 6% y/y) was in-line with the company’s guidance range of $700.0 million and $764.0 million and below the Street’s $746.3 million estimate primarily driven by demand for the company's emerging product portfolio whil

 PRESS RELEASE

Check Point Software Reports Fourth Quarter and 2025 Full Year Results

Check Point Software Reports Fourth Quarter and 2025 Full Year Results TEL AVIV, Israel, Feb. 12, 2026 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), today announced its financial results for the fourth quarter and full year ended December 31, 2025. Fourth Quarter 2025 Highlights         Calculated Billings* reached $1,039 million, an 8 percent increase year over yearRemaining Performance Obligation (RPO)**: $2,728 million, an 8 percent increase year over yearTotal Revenues: $745 million, a 6 percent increase year over yearSecurity Subscription Revenues: $325 million, an 11 percent increase ye...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch