#CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe. Recent operations used the #GearDoor #backdoor with SSHcmd and SilverScreen, enabling remote access, covert screen capture, and stealthy control after #phishing and server exploitation.
daniel1820815@infosec.exchange
Posts
-
#CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe. -
#CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations.#CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.
-
#CheckPoint Research has published its Untold Stories of 2025, a compilation covering multiple notable campaigns that occurred during 2025.#CheckPoint Research has published its Untold Stories of 2025, a compilation covering multiple notable campaigns that occurred during 2025. These include exploitation of #Microsoft #SharePoint (“ToolShell”), and adversary-in-the-middle #phishing used to bypass MFA, as well as state-linked operations attributed to groups such as Camaro Dragon and COLDRIVER. The report also highlights evolving command-and-control techniques observed across Europe and Central Asia.
-
#CheckPoint Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East.#CheckPoint Research summarizes five key Iranian threat actor clusters relevant to the current conflict in the Middle East. It outlines the main TTPs these groups have recently used against targets in the Middle East and the United States and shares six defensive measures IT teams should take to help prevent attacks during the ongoing conflict.
What Defenders Need to Know about Iran’s Cyber Capabilities - Check Point Blog
With the current Iran crisis at its peak, cyber activity is a relevant part of the threat picture alongside kinetic and political pressure. Iran’s
Check Point Blog (blog.checkpoint.com)