Learn more on how to stay protected from the latest Ransomware Pandemic
Check Point Advisories

Tech Support Scams Obfuscation Methods

Check Point Reference: CPAI-2018-1277
Date Published: 10 Dec 2018
Severity: High
Last Updated: 31 Dec 2018
Protection Provided by:

Security Gateway
R80, R77, R75

Who is Vulnerable?
Vulnerability Description Many scams have emerged looking to infect users with malware by giving users false information claiming that their computers are infected. After such claims an alert appears requesting the client to approve the running of a javascript file. A successful attack can lead to downloading malware to the client's computer.

Protection Overview

This protection detects attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Tech Support Scams Obfuscation Methods protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Security Products Enforcement Violation.
Attack Information:  Tech Support Scams Obfuscation Methods

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO