Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

Your Check Point Weekly Updates & Threat Intelligence -- 08/11/2020

Aaron_Rose
Employee
Employee
1 0 544

Newsletter_Social.jpg

 

ANNOUNCEMENTS & UPCOMING EVENTS

  • Virtual Conference: “Cyber Security Summit: Charlotte 2020”
    When: Thursday, August 13th 8:30am – 6:00pm EST
    Register Here

  • Cloud Security Checkup & $100 AWS Credit
    Sure, you’ve secured your perimeter with the latest in Threat Prevention Technologies, but what about your cloud environment? 
    Check Point offers a free Cloud Security Checkup including:
    --Cloud Best Practices scan: Compute, storage, database, security & identity
    --Malicious Network Activities detection: Communication to C&C servers, infected EC2, compromised connection, data exfiltration potential, crypto-miners activity and more
    Download a sample report here
    Request a free Cloud Security Checkup & receive a $100 AWS Credit here

  • Urgent Mobile Vulnerability: Check Point Research has discovered over 400 vulnerabilities in a DSP chip used in over 40% of the mobile devices on the market.  This is very serious and can result in the following:
    --Attackers can turn the phone into a perfect spying tool, without any user interaction required – The information that can be exfiltrated from the phone include photos, videos, call-recording, real-time microphone data, GPS and location data, etc.
    --Attackers may be able to render the mobile phone constantly unresponsive – Making all the information stored on this phone permanently unavailable – including photos, videos, contact details, etc. – in other words, a targeted denial-of-service attack.
    --Malware and other malicious code can completely hide their activities and become un-removable
    Learn more:
    When: Thursday, August 13th – 2pm EST
    Register for the webinar here
       

  • Podcast: Beyond the Perimeter “Coffee Talks”
    Join your favorite radio voice, Brian Linder, and co-host, Aaron Rose on our new bi-weekly “Coffee Talks” podcast.  Each episode we explore the latest in Advanced Threats and discuss the latest cyber security trends, technologies & best practices with our guests.  Just 14 minutes each episode, it’s the perfect way to start your day by staying in the loop as we all emerge into a post-COVID world.
    iTunes
    Spotify


VULNERABILITIES AND PATCHES

  • Check Point Research has found 400 vulnerabilities , dubbed “Achilles”, in Qualcomm’s snapdragon mobile chipset. The vulnerabilities impact over 40% of all mobile devices globally including high-end phones from Google, Samsung, LG, Xiaomi, OnePlus and more. The vulnerabilities can allow an attacker to turn the device into a spying tool, or alternatively to render it constantly unresponsive, requiring factory reset.
    Check Point SandBlast Mobile provides protection against this threat
  • Check Point Research has shared the details about vulnerabilities in Philips Hue IoT lightbulbs. By masquerading as a legitimate lightbulb, researchers were able to infiltrate the IP network using a remote over-the-air ZigBee exploit.
    Check Point Cyber Security for IoT Networks and Devices provides protection against this threat
  • Researchers have discovered tens of vulnerabilities in a Mercedes-Benz-E-Class, including issues that can be exploited to remotely hack the car.
  • TeamViewer has fixed a vulnerability (CVE-2020-13699) that could allow an attacker to establish a quiet connection to a victim’s computer and execute code or obtain password hashes.

 

TOP ATTACKS AND BREACHES

  • Reddit has suffered an attack, in which tens of channels have been defaced to show messages in support of Donald Trump’s reelection campaign.
  • Canon has suffered from a Maze ransomware attack that impacts numerous services, including Canon's email, Microsoft Teams, USA website, and other internal applications. In an internal alert sent to employees, Canon mentioned that 10TB of company data has been stolen. Check Point SandBlast and Anti-Ransomware provide protection against this threat
  • Intel Corporation has suffered a data breach leaking more than 20GB of the company source code and proprietary data. This is allegedly the first out of a multi-part series of Intel-related leaks.
  • cPanel, web-sites administrative software, has been hit by a phishing scam. The unknown attackers spread phishing emails to cPanel users with a fake security advisory alerting them of a critical vulnerability in their web hosting management panel. Victims who clicked the malicious link were redirected to a phishing website asking for their cPanel credentials.
    Check Point SandBlast and Anti-Virus provide protection against this threat
  • The British Dental Association (BDA) has suffered a data breach causing fears that the bank account details of several of UK dentists have been stolen.
  • ProctorU, an online exam tool, has confirmed a data breach exposing private data of more than 400,000 accounts online. The tool is being used by educational institutes worldwide.
  • A new credit card skimming campaign making use of homoglyph – domain lookalike – techniques has been connected to an existing Magecart threat group that utilizes the inter kit and favicon to hide skimming activity and lure a victim into purchasing on malicious websites.
    Check Point SandBlast and Anti-Virus provide protection against this threat

 

THREAT INTELLIGENCE REPORTS

  • Check Point Research has launched an Anti-Debug Encyclopedia, describing anti-debug tricks which work on the latest Windows releases with the most popular debuggers (such as OllyDbg, WinDbg, x64dbg). The repository is implemented in a Check Point open-source project, and can help provide a better understanding of how anti-debugging techniques work or to assess debuggers and anti-debug plugins.
  • Check Point Research has released a report showing that Google and Amazson were the brands most imitated in phishing attacks during Q2 2020. In phishing attacks on mobile devices, the top exploited brands are Facebook and WhatsApp.
  • Sensitive data of more than 900 pulse secure VPN enterprise servers has been leaked on a Russian forum. The data contained a list of plaintext usernames and passwords, along with IP addresses, SSH keys, and more.
  • New EtherOops attack is taking advantage of faulty Ethernet cables.  The attack can be used to bypass network defenses and attack devices inside a closed enterprise network.

 

BOOKMARKS

  • CheckMates Video Series: Check Point for Beginners
    If you’re new to Check Point, or would like to brush up on your CP skillset, this is an excellent video series to get you started!  
  • The “Ultimate” Collection of Check Point Links
    This is a personal favorite compiled by Valerie Loukine, a Cyber Security Evangelist here at Check Point.  The document includes 50+ links to helpful articles, secure knowledge (SK’s), best practice guides, videos & more.  I highly recommend you bookmark this one!
  • CheckMates “TechTalk” Webinar Recordings
    In case you missed our previous TechTalks, checkout this page for a list of recordings of all the TechTalk webinar series.  Including Management API Best Practices, Migrate to R80.40, IPS Ease of Use in R80.20, & more.