Imagine waking up to headlines claiming your company’s internal systems were breached—and the hacker says they’ve got maps of your network, employee contracts, and login credentials. That’s the position Check Point found itself in this week. But the cybersecurity giant is brushing off the noise, calling it a non-event.
Table of Contents
Who is Behind the Alleged Check Point Hack?
A hacker going by the alias CoreInjection posted on a known cybercrime forum, claiming to have obtained a “highly sensitive” dataset stolen from Check Point’s systems.
The dataset reportedly includes:
- Internal network maps
- Employee contracts
- User credentials
No evidence has been publicly shared yet, but the post has triggered concern among cybersecurity researchers.
What the Hacker Claims Was Stolen
According to CoreInjection’s forum post, the compromised data isn’t just fluff—it supposedly includes:
- Credentials of users
- Sensitive HR-related documents
- Maps detailing internal infrastructure
These types of files, if real and recent, could be leveraged to access secure systems or blackmail targets.
Check Point’s Response: “Not a Breach”
In a statement to TechPlugged, a Check Point spokesperson downplayed the incident.
“We really wouldn’t call it a breach,” the spokesperson said.
“This was one account with limited access on a portal.”
Check Point insists this was an old, isolated case that only affected a small number of organizations—not their wider network or customer base.
The company maintains:
-
No customer data was exposed
-
No production systems were involved
-
The incident was resolved months ago
They argue that CoreInjection is simply recycling outdated data to create hype.
Not everyone’s convinced.
Hudson Rock CTO Alon Gal expressed “high certainty” that Check Point had been compromised. According to Gal, the attacker may have accessed an admin-level account with elevated privileges, which could imply deeper system access.
Still, Gal clarified that the breach is not officially confirmed, and the full extent remains uncertain.
This isn’t the first time Check Point has faced the spotlight. In 2024, hackers targeted Check Point’s VPN software, attempting to infiltrate corporate networks via exposed endpoints.
Fortunately, the attacks were largely blocked—and the company issued a quick patch to address any vulnerabilities. Check Point’s security advisory provided step-by-step remediation at the time.
If you’re using Check Point products in your business, here are a few smart precautions:
-
Update credentials for all administrative accounts—especially those tied to web portals.
-
Monitor internal logs for unusual access patterns.
-
Apply the latest patches for all Check Point components.
-
Review access privileges across employee accounts regularly.
Most importantly, don’t panic. Just stay proactive.