©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 1
Who is Check Point?
THE WORLD’S LARGEST DEDICATED SECURITY VENDOR
THREAT INTELLIGENCE
ANALYSTS
THREAT PREVENTION
RESEARCHERS
MOBILE SECURITY
3000
RESEARCHERS
SECURITY ARCHITECTS
SECURITY EXPERTS
CYBERSECURITY
INVESTIGATORS
REVERSE ENGINEERS
COMPUTER INCIDENT
RESPONSE TEAM (CIRT)
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 2
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 3
80’s and 90’s
• Who ?
̶ Nerds
̶ Computer geeks
• Why ?
̶ Show off
̶ Fun
̶ Cause damage
Why ?
Make/Steal Money
Steal/Sell Data
Cause Damage
Spy
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 6
AN EVER- CHANGING THREAT LANDSCAPE
Every year THREATS are becoming more sophisticated
and MORE FREQUENT
2014
2010
2007
2004
1997 RANSOMWARE
HACTIVISM
STATE SPONSORED
INDUSTRIAL ESPIONAGE
NEXT GEN APTS
VIRUSES ADWARE DDOS (MASS APT TOOLS)
AND AND APTS UTILIZING WEB
WORMS SPYWARE INFRASTRUCTURES (DWS)
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 7
How Hackers Catch Their Victims
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 10
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 11
334 listings for “software &
malware”
114 91 117 92
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 13
Social Profile Technical Profile
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 15
Hamas’ cyber tactics exposed
Attacking IDF soldier’s mobile phones
It was Hamas”.
©2017 Check Point Software Technologies Ltd. 17
These apps were actually
infected with Trojan horse YeeCall Pro
malware.
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 27
Cloud threat
Mobility SMB / branch solutions prevention security
Seamless gateway
solutions document
encryption Public Cloud DC
Protection
Secure
business
container
Industrial
Control
Systems (ICS)
Wireless /
Mobile Threat
Wired SMB
Prevention
gateways
SSL VPN
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 29
Open Discussion
©2017 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 30
MALICIOUS APPS DAMAGES
Tracking Stealing Taking
Tapping
Location Contact list Photos
WhatsApp
Call Tapping Stealing Messages
(SS7) Emails Microphone
Recordings Stealing
Passwords