Check Point Research Latest Research by our Team
- Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Frameworkby pedrod@checkpoint.com on January 13, 2026 at 6:31 am
Key takeaways VoidLink – a Cloud-First Malware Framework In December 2025, Check Point Research identified a small cluster of previously unseen Linux malware samples that appear to originate from a Chinese-affiliated development environment. Many of the binaries included debug symbols and other development artifacts, suggesting we were looking at in-progress builds rather than a finished, The post Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework appeared first on Check Point Research.
- 12th January – Threat Intelligence Reportby lorenf on January 12, 2026 at 10:07 am
For the latest discoveries in cyber research for the week of 12th January, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Manage My Health, New Zealand’s largest patient portal, has acknowledged a cyberattack occurred on December 2025, that potentially exposed data of nearly 110K users. An alleged attacker, dubbed Kazu, claimed responsibility and The post 12th January – Threat Intelligence Report appeared first on Check Point Research.
- Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaignsby alexeybu on January 7, 2026 at 1:07 pm
Key takeaways Introduction GoBruteforcer is a botnet that turns compromised Linux servers into scanning and password brute-force nodes. It targets internet-exposed services such as phpMyAdmin web panels, MySQL and PostgreSQL databases, and FTP servers. Infected hosts are incorporated into the botnet and accept remote operator commands. Newly discovered weak credentials are used to steal data, The post Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns appeared first on Check Point Research.
- 5th January – Threat Intelligence Reportby eladleon@checkpoint.com on January 5, 2026 at 12:34 pm
For the latest discoveries in cyber research for the week of 5th January, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Two US banks, Artisans’ Bank and VeraBank, disclosed that customer data was exposed in an August ransomware attack on their vendor, Marquis Software. The vendor was breached via SonicWall vulnerability, and while The post 5th January – Threat Intelligence Report appeared first on Check Point Research.
- 29th December – Threat Intelligence Reportby lorenf on December 29, 2025 at 11:33 am
For the latest discoveries in cyber research for the week of 29th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romanian Waters, the country’s national water management authority, was hit by a ransomware attack that resulted in nearly 1,000 computer systems across national and regional offices being encrypted. The attack affected geographic The post 29th December – Threat Intelligence Report appeared first on Check Point Research.
- 22nd December – Threat Intelligence Reportby lorenf on December 22, 2025 at 12:39 pm
For the latest discoveries in cyber research for the week of 22nd December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES An adult content platform PornHub has disclosed a data breach linked to analytics provider Mixpanel. The breach exposed more than 200 million records related to Premium users, including email addresses, search, watch, The post 22nd December – Threat Intelligence Report appeared first on Check Point Research.
- GachiLoader: Defeating Node.js Malware with API Tracingby samanthar@checkpoint.com on December 17, 2025 at 2:11 pm
Research by: Sven Rath (@eversinc33), Jaromír Hořejší (@JaromirHorejsi) Key Points Introduction In a previous publication, we examined the YouTube Ghost Network, a coordinated collection of compromised accounts that abuse the platform to promote malware. In our current research, we analyze one specific campaign of this network, which stood out as the deployed malware implements a previously undocumented PE injection The post GachiLoader: Defeating Node.js Malware with API Tracing appeared first on Check Point Research.
- Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operationby samanthar@checkpoint.com on December 16, 2025 at 1:01 pm
Key Findings Introduction Check Point Research tracks a sustained, highly capable espionage cluster, which we refer to as Ink Dragon, and is referenced in other reports as CL-STA-0049, Earth Alux, or REF7707. This cluster is assessed by several vendors to be PRC-aligned. Since at least early 2023, Ink Dragon has repeatedly targeted government, telecom, and The post Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation appeared first on Check Point Research.
- 15th December – Threat Intelligence Reportby eladleon@checkpoint.com on December 15, 2025 at 1:03 pm
For the latest discoveries in cyber research for the week of 15th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The Indian government confirmed cyber incidents involving GPS spoofing at seven major airports, including Delhi, Mumbai, Kolkata, and Bengaluru. The attack affected aircrafts using GPS-based landing procedures. Despite signal disruption to navigation The post 15th December – Threat Intelligence Report appeared first on Check Point Research.
- Cracking ValleyRAT: From Builder Secrets to Kernel Rootkitsby shlomoo@checkpoint.com on December 10, 2025 at 2:40 pm
Highlights: Introduction Throughout 2025, we conducted and published several reports related to our research on the Silver Fox APT. In some of them (for example, here), the threat actor delivered the well-known ValleyRAT backdoor, also referred to as Winos or Winos4.0, as the final stage. Since this malware family is widely used, modular, and often associated with Chinese threat actors The post Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits appeared first on Check Point Research.
- 8th December – Threat Intelligence Reportby lorenf on December 8, 2025 at 1:07 pm
For the latest discoveries in cyber research for the week of 8th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The University of Pennsylvania and the University of Phoenix were hit by data breaches after attackers exploited zero-day vulnerabilities in Oracle E-Business Suite servers. At least 1,488 people at UPenn and numerous The post 8th December – Threat Intelligence Report appeared first on Check Point Research.
- The $9M yETH Exploit: How 16 Wei Became Infinite Tokensby samanthar@checkpoint.com on December 2, 2025 at 1:42 pm
By: Dikla Barda, Roman Zaikin, and Oded Vanunu On November 30, 2025, Check Point Research detected a critical exploit targeting Yearn Finance’s yETH pool on Ethereum. Within hours, approximately $9 million was stolen from the protocol. The attacker achieved this by minting an astronomical number of tokens—235 septillion yETH (a 41-digit number)—while depositing only 16 The post The $9M yETH Exploit: How 16 Wei Became Infinite Tokens appeared first on Check Point Research.
- CVE-2025-61260 — OpenAI Codex CLI: Command Injection via Project-Local Configurationby samanthar@checkpoint.com on December 1, 2025 at 1:20 pm
By: Isabel Mill & Oded Vanunu OpenAI Codex CLI is OpenAI’s command-line tool that brings AI model-backed reasoning into developer workflows. It can read, edit, and run code directly from the terminal, making it possible to interact with projects using natural language commands, automate tasks, and streamline day-to-day development One of its key features is The post CVE-2025-61260 — OpenAI Codex CLI: Command Injection via Project-Local Configuration appeared first on Check Point Research.












