- A hacker claims to sell data stolen from the checkpoint
- The security company says data is from an old violation that has been processed
- But some security experts are not convinced of this explanation
A hacker claims to have stolen a “very sensitive” data set from Check Point – but the company is looking to play all the worries that users may have.
Cybercriminal, under the name of CoreInjection, posted about the data set with compromised checkpoint files on a cybercrime forum – and claims that the information contains user information, employee contract information and internal network cards, among other things.
A spokesman from Check Point told Techradar Pro That they “really wouldn’t call it a violation” and added that this was “an account with limited access on a portal”. The company’s statement assures that this is an “old, well -known and very clarified event” that involved only a few organizations and “does not include customers’ systems, production or security architecture.”
“If this is completely fake I’d be surprised”
However, concerns have been raised in the cybersecurity industry, where Hudson Rock CTO, Alon Gal says there is a “high security” that the checkpoint has been hacked, with a threat actor who appears to have “gained access to an administrator account with serious privileges.”
While the researcher claims he would be surprised, he also explains that the violation is “not yet officially confirmed”.
In Check Point’s official response, it confirmed that a violation occurred, but that this was long ago and that the hacker just recycles old information, which “false involves excessive allegations that never happened.”
“This was handled months ago and did not include the description that was detailed about this message. These organizations were updated and handled at the time, and this is nothing more than the regular recycling of old information. We believe there was no security risk at any time to check the point, its customers or employees,” the spokesman said.
By 2024, Check Point VPN software was targeted by hackers to access corporate networks, though these attempts largely failed, and check point outlined a simple and easy solution.
Via the register