Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

SSL/TLS based Malware Attacks

I am looking for a recent checkpoint document on Malware Types or Percentages of Malware types that use TLS/SSL to conceal their activity. I have an example here from Sophos which is a good model of what we are looking for.

 

https://news.sophos.com/en-us/2021/04/21/nearly-half-of-malware-now-use-tls-to-conceal-communications/

 

;
TO READ THE FULL POST it's simple and free
2 Comments
Ryan_St__Germai
Specialist

For real world examples take a look at any public detonation service like https://app.any.run, specifically post-exploitation activity. URLHaus is a good example of how many initial stage payloads are delivered over https.

the_rock
Champion
Champion

Well, considering you work for Check Point, you would have more access to it than any of us in the community. Maybe reach out to R&D or Sales to see if they can provide such a document.

By the way, I did google it, as well as looked on support site as well, but could not find anything similar to what you are looking for, sorry.