Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

SSL/TLS based Malware Attacks

Kamran_Nahidi
Employee
Employee
0 2 1,533

I am looking for a recent checkpoint document on Malware Types or Percentages of Malware types that use TLS/SSL to conceal their activity. I have an example here from Sophos which is a good model of what we are looking for.

 

https://news.sophos.com/en-us/2021/04/21/nearly-half-of-malware-now-use-tls-to-conceal-communication...

 

2 Comments
Ryan_St__Germai
Advisor

For real world examples take a look at any public detonation service like https://app.any.run, specifically post-exploitation activity. URLHaus is a good example of how many initial stage payloads are delivered over https.

the_rock
Legend
Legend

Well, considering you work for Check Point, you would have more access to it than any of us in the community. Maybe reach out to R&D or Sales to see if they can provide such a document.

By the way, I did google it, as well as looked on support site as well, but could not find anything similar to what you are looking for, sorry.