Create a Post
Showing results for 
Search instead for 
Did you mean: 

SSL/TLS based Malware Attacks

I am looking for a recent checkpoint document on Malware Types or Percentages of Malware types that use TLS/SSL to conceal their activity. I have an example here from Sophos which is a good model of what we are looking for.


TO READ THE FULL POST it's simple and free

For real world examples take a look at any public detonation service like, specifically post-exploitation activity. URLHaus is a good example of how many initial stage payloads are delivered over https.


Well, considering you work for Check Point, you would have more access to it than any of us in the community. Maybe reach out to R&D or Sales to see if they can provide such a document.

By the way, I did google it, as well as looked on support site as well, but could not find anything similar to what you are looking for, sorry.