<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Check Point Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/check-point/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/check-point/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 05 Jun 2017 16:24:53 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Check Point Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/check-point/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fireball &#8211; 1,000 times bigger than Wannacry.</title>
		<link>https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 05 Jun 2017 16:24:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=738</guid>

					<description><![CDATA[<p>Have you seen the news reports and headlines about Fireball? No? That&#8217;s odd. 250 million PCs are infested with it. That&#8217;s a thousand times more machines around the world than WannaCry (you do remember WannaCry don&#8217;t you, or was it sooo two weeks ago ?). So you would think the news organisations would be all&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">Fireball &#8211; 1,000 times bigger than Wannacry.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-739" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball-150x150.jpg" alt="Fireball malware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Fireball.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Have you seen the news reports and headlines about Fireball? No? That&#8217;s odd. 250 million PCs are infested with it. That&#8217;s a thousand times more machines around the world than WannaCry (you do remember <a href="http://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> don&#8217;t you, or was it sooo two weeks ago ?). So you would think the news organisations would be all over it. Of course, it&#8217;s not doing anything much to it&#8217;s victim PCs &#8230; at this point &#8230; but that could easily change. So nothing really to report on, is there.<span id="more-738"></span></p>
<p>Not only has it not carried out anything of note &#8230; yet &#8230; it has mainly been spread around India, Brazil, Mexico and Indonesia, which account for ~33% of the total infections. The US has about 5.5 million infected machines or 2.2% of the total. Fireball is an Adware product of a Chinese Digital Marketing agency called Rafotech. This has been <a href="http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/">discovered</a> by security researchers at Check Point.</p>
<p><strong>So how has it spread so widely and quietly?</strong></p>
<p>Lets answer that by saying what it is first. It&#8217;s what is known as a browser high-jacker. It takes control of your browser (Chrome, Firefox, Safari, Internet Explorer or Edge) and directs any searches you make on the internet to go through Rafotech search engines rather than Google or Yahoo. They use other tracking technology (<a href="https://en.wikipedia.org/wiki/Web_beacon">tracking pixels</a>) to capture personal data about you. All of this generates advertising revenue for Rafotech as Fireball controls where your browser goes.</p>
<p>How it has spread was by being bundled with other software, which people have downloaded and installed. Fireball was included and installed without permission on the victim&#8217;s computer. Fireball is capable of executing any code on the victim machines, resulting in a wide range of actions from stealing credentials to dropping additional malware.</p>
<p>What this means is that, <strong>at this time</strong> it is nothing more than a sneaky spy that is watching what you are browsing and re-directing your searches to it&#8217;s own search engines so it can generate advertising revenue for Rafotech. It could very easily be weaponised and have much more destructive malware execute without your permission on your machine.</p>
<p><strong>How do I know if I&#8217;m infected?</strong></p>
<p>To check if you’re infected, first open your web browser. Was your home-page set by you? Are you able to modify it? Are you familiar with your default search engine and can modify that as well? Do you remember installing all of your browser extensions? If the answer to any of these questions is “NO”, this is a sign that you’re infected with some type of adware.</p>
<p><strong>How do I clean it up?</strong></p>
<p><span style="color: #ff0000;"><strong>1.</strong></span> To remove almost any adware:</p>
<p style="padding-left: 30px;">Follow these simple steps on Windows:</p>
<p style="padding-left: 30px;">1. Uninstall the adware by removing the application from the Programs and Features list in the Windows Control Panel.</p>
<p style="padding-left: 30px;">For Mac OS users:</p>
<ol>
<li>Use the Finder to locate the Applications</li>
<li>Drag the suspicious file to the Trash.</li>
<li>Empty the Trash.</li>
</ol>
<p style="padding-left: 30px;">Note – A usable program is not always installed on the machine and therefore may not be found on the program list.</p>
<hr />
<p><span style="color: #ff0000;"><strong>2.</strong></span> Scan and clean your machine, using:</p>
<ul>
<li>Anti-Malware software</li>
<li>Adware cleaner software</li>
</ul>
<hr />
<p><span style="color: #ff0000;"><strong>3.</strong></span> Remove malicious Add-ons, extensions or plug-ins from your browser:</p>
<p style="padding-left: 30px;"><strong>On Google Chrome:</strong><br />
a. Click the Chrome menu icon and select Tools &gt; Extensions.<br />
b. Locate and select any suspicious Add-ons.<br />
c. Click the trash can icon to delete.</p>
<p style="padding-left: 30px;"><strong>On Internet Explorer:</strong><br />
a. Click the Setting icon and select Manage Add-ons.<br />
b. Locate and remove any malicious Add-ons.</p>
<p style="padding-left: 30px;"><strong>On Mozilla Firefox:</strong><br />
a. Click the Firefox menu icon and go to the Tools tab.<br />
b. Select Add-ons &gt; Extensions.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Remove any suspicious Add-ons.<br />
d. Go to the Add-ons manager &gt; Plugins.<br />
e. Locate and disable any malicious plugins.</p>
<p style="padding-left: 30px;"><strong>On Safari:</strong><br />
a. Make sure the browser is active.<br />
b. Click the Safari tab and select preferences.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Select the Extensions tab.<br />
d. Locate and uninstall any suspicious extensions.</p>
<hr />
<p><span style="color: #ff0000;"><strong>4.</strong></span> Restore your internet browser to its default settings:</p>
<p style="padding-left: 30px;"><strong>On Google Chrome:</strong><br />
a. Click the Chrome menu icon, and select Settings.<br />
b. In the On startup section, click Set Pages.<br />
c. Delete the malicious pages from the Startup pages list.<br />
d. Find the Show Home button option and select Change.<br />
e. In the Open this page field, delete the malicious search engine page.<br />
f. In the Search section, select Manage search engines.<br />
g. Select the malicious search engine page and remove from the list.</p>
<p style="padding-left: 30px;"><strong>On Internet Explorer:</strong><br />
a. Select the Tools tab and then select Internet Options.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
b. In the Advanced tab, select Reset.<br />
c. Check the Delete personal settings box.<br />
d. Click the Reset button.</p>
<p style="padding-left: 30px;"><strong>On Mozilla Firefox:</strong><br />
a. Enable the browser Menu Bar by clicking the blank space near the page tabs.<br />
b. Click the Help tab, and go to Troubleshooting information.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Select Reset Firefox.</p>
<p style="padding-left: 30px;"><strong>On Safari:</strong><br />
a. Select the Safari tab and then select Preferences.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
b. In the Privacy tab, the Manage Website Data… button.<br />
<span style="color: #999999;"><em>    A new window opens.</em></span><br />
c. Click the Remove All button.</p>
<p>The post <a href="https://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">Fireball &#8211; 1,000 times bigger than Wannacry.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sick subtitles can infect your media player</title>
		<link>https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 29 May 2017 15:28:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Kodi]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Media Player]]></category>
		<category><![CDATA[Popcorn Time]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strem.io]]></category>
		<category><![CDATA[Stremio]]></category>
		<category><![CDATA[Subtitles]]></category>
		<category><![CDATA[VLC]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=714</guid>

					<description><![CDATA[<p>Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-715" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg" alt="Evil subtitles" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing the media on.<span id="more-714"></span></p>
<p>According to <a href="https://www.theregister.co.uk/2003/10/18/kill_bill_trojan_fails/">this</a>, the concept of using malicious subtitle files to compromise a machine goes back to the early 2000&#8217;s. However that was not a very widespread phenomenon back in the day.</p>
<p>In this modern era, where every home probably has multiple media players, this could become a very serious problem, because you might not have the media player set to automatically update. In fact in some cases there is no automatic update facility available, only a message to suggest you update the software manually. This is the case with VLC and Kodi for Windows. As we say in our <a href="http://www.l2cybersecurity.com/use-automatic-updates/">First Commandment</a>, you should always keep your software up-to-date with patches and new versions.</p>
<p>You might ask what kind of impact could a malicious subtitle file really have. The researchers at Check Point posted their <a href="http://blog.checkpoint.com/2017/05/23/hacked-in-translation/">research</a> into this attack vector and the following is what they said could happen:</p>
<blockquote><p><em>By conducting attacks through subtitles, hackers can take complete control over any device running them. From this point on, the attacker can do whatever he wants with the victim’s machine, whether it is a PC, a smart TV, or a mobile device. The potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, mass Denial of Service attacks, and much more.</em></p></blockquote>
<p>So, yes it is pretty serious alright. The researchers also discovered that it is possible to manipulate sites that host subtitles in order to make a malicious subtitle file more &#8220;popular&#8221; so the sick subtitles would be more likely to be chosen and loaded by the media player when the video is being played.</p>
<p>They have also provided a video to show, as a proof of concept, how easy it is to take control of the victim&#8217;s computer by way of malicious subtitles.</p>
<p><iframe title="Hacking Demonstration | Popcorn Time Translation Malware Found" width="500" height="375" src="https://www.youtube.com/embed/vYT_EGty_6A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>I realised after reading this story that I still have Kodi installed on my home PC, though I have not used it in a couple of years (as I use Plex to watch my media now). It was running version 14.1 whereas the current version is 17.3. So I&#8217;ve uninstalled it altogether now and also verified that my Plex installation is fully updated, as well as any installs of VLC. I gotta practice what I preach. <img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f61/1/28/1f64f.png" alt="?" /><img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f64/1/28/1f60e.png" alt="?" /></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Nightmare on Quadrooter Street.</title>
		<link>https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 06:39:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Quadrooter]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=548</guid>

					<description><![CDATA[<p>When I was a teenager, watching slasher flicks like A Nightmare on Elm Street (the original 1984 version) and Halloween, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">When I was a teenager, watching slasher flicks like <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">A Nightmare on Elm Street</span></i> (the original 1984 version) and <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">Halloween</span></i>, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit there all cool-like while all around me leaped out of their seats. I would mentally take a moment to let the occurrence happen and then internally say &#8220;Yep! That thing that happens in every scary movie happened&#8221; and just continue watching. I just don&#8217;t react to the situation the instant it happens.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Nowadays I continue this type of trick when I read scary stories. For example, last weeks <a href="http://www.l2cybersecurity.com/garda-systems-hit-by-ransomware/">blog post</a> about the Garda Síochána hack. After all the initial &#8220;Mob hack the Garda&#8221; hyperbole, it would appear, after a few days, that it was a simple Ransomware incident.</span></p>
</div>
<p><span id="more-548"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And so it is with the <a href="https://www.checkpoint.com/resources/quadrooter-vulnerability-enterprise/">recent story</a> from Check Point Software Technologies Ltd about their sexily named Quadrooter. A set of four vulnerabilities what they discovered in the Qualcomm chips that are in use in up to 900 million Android devices worldwide.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There&#8217;s no denying that the vulnerabilities exist, but were things as bad as Check Point were making out? Obviously if you purchased Check Point&#8217;s security solution for mobile devices, you would be protected from Quadrooter, but guess what? You were most likely already protected &#8230; by Android itself.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As long as you are running Android 4.2 or higher on which &#8220;Verify Apps&#8221; was turned on by default and have not changed the app store settings to enable &#8220;Unknown Sources&#8221;, you won&#8217;t be affected by 3 of the 4 vulnerabilities. Simples. Google are working on a patch for the 4th vulnerability. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">According to Google, 90% of the 900 million devices quoted by Check Point will be protected from Quadrooter, and the remaining 10% would be if they re-enable &#8220;Verify Apps&#8221;.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You can see further information <a href="http://www.androidcentral.com/google-confirms-verify-apps-can-block-apps-quadrooter-exploits">here</a>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So another Scary Story that, with the passing of a few days, turns out not to be so scary after all.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
