Article Details

Scrape Timestamp (UTC): 2025-03-31 16:41:16.193

Source: https://www.theregister.com/2025/03/31/check_point_confirms_breach/

Original Article Text

Click to Toggle View

Check Point confirms breach, but says it was 'old' data and crook made 'false' claims. Explanation leaves a 'lot of questions unanswered,' says infosec researcher. A digital burglar is claiming to have nabbed a trove of "highly sensitive" data from Check Point - something the American-Israeli security biz claims is a huge exaggeration. A cybercrime forum user going by the name CoreInjection advertised "a highly sensitive dataset" allegedly comprised of Check Point files on Sunday evening. They claimed this contained internal network maps and architectural diagrams, user credentials (including hashed and plaintext passwords), employee contact information, and proprietary source code. Screenshots shared in the post appear to show CoreInjection inside a Check Point admin Infinity (security management) portal, supposedly granting themselves the ability to change users' two-factor authentication settings. Check Point denies there was ever a security risk to customers and employees, claiming the orgs affected were "updated" at the time, and the crim was merely recycling old information. The Register contacted Check Point for answers to various questions, many of which it did not respond to. The vendor instead sent over a brief statement: "This is an old, known, and very pinpointed event which involved only a few organizations and a portal that does not include customers' systems, production, or security architecture.  "This was handled months ago and did not include the description detailed on the dark forum message. These organizations were updated and handled at that time, and this is not more than the regular recycling of old information. We believe that at no point was there a security risk to Check Point, its customers, or employees." There are perhaps 10,000 reasons to doubt Oracle Cloud's security breach denial The vendor also posted a similar statement to its support page, adding that the break in had affected only three organizations in December 2024. It said the root cause of the breach was the abuse of compromised credentials for a portal account "with limited access." "It was limited to a list of several account names with product names, three customers' accounts with contact names, and a list of some Check Point employees' emails. As said, this does not include customers' systems, production, or security architecture. "The content of the post falsely implies exaggerated claims which never happened. The portal has different internal mitigations." Hudson Rock co-founder and CTO Alon Gal was one of the more prominent industry figures to raise concerns about the criminal's allegations.  Before the vendor's response, he opined that the screenshots the criminal provided appeared to him to be "highly convincing" as CoreInjection had a known history of targeting Israeli companies and a "track record of legitimate leaks" because many of the details in the images appeared to be too real to be faked. After the support page statement was published on Monday, Gal said: "To me, honestly, it leaves a lot of questions unanswered, but the scope of the breach is likely narrower than initially thought." Referring to one of CoreInjection's screenshots, Gal noted an admin panel view appeared to list more than 120,000 accounts, 18,824 of which appeared to be active and paying. He noted in an earlier post that he wanted to "make sure people are not freaking out" and could "differentiate between what the hacker is saying they have access to (source code, passwords, sensitive projects), and what they show in the images," adding: "This could end with a limited impact which does not affect customers or Check Point's IP." Check Point told The Register it would not be making any further comment.

Daily Brief Summary

DATA BREACH // Check Point Data Breach Claims Questioned Amidst Misinformation

A user on a cybercrime forum claimed to have accessed highly sensitive data from Check Point, including internal network maps, user credentials, and proprietary source code.

Check Point contends that the data was old, the incident was previously addressed, and it involved only a limited scope with no impact on customers' primary systems.

The cybercriminal used CoreInjection's account to advertise the breach and posted screenshots purportedly showing access to Check Point's admin Infinity portal.

Industry experts, including Hudson Rock's CTO Alon Gal, initially found the claims credible but later acknowledged the breach's scope might be narrower than suggested.

Check Point asserts no security risk was posed to its customers or employees, describing the published information as a recycling of old data.

The breach, clarified to have occurred in December, was due to compromised credentials for a portal account with restricted access, impacting three organizations.

Despite claims, Check Point emphasizes that customer systems, production, or security architecture were not compromised.