Check Point VPNs Under Siege: Hackers Exploit Weak Passwords in Global Attack Wave

Check Point warns that threat actors are targeting its Remote Access VPN devices, exploiting old local accounts with weak, password-only authentication. To combat this, customers should switch to more secure authentication methods or delete vulnerable accounts.

Pro Dashboard

Hot Take:

Looks like Check Point VPNs are the new “it” target for hackers, and it’s time to say goodbye to those old, weak passwords. Hackers are treating them like they’re on a treasure hunt, and we all know how that usually turns out. Spoiler: Not good for the treasure owner.

Key Points:

  • Check Point warns of attacks on Remote Access VPN devices using insecure password-only authentication.
  • Advised customers to switch to more secure authentication methods or delete old local accounts.
  • Released a hotfix to block weak password-only local accounts from accessing VPNs.
  • Cisco also reports similar attacks targeting their VPN and SSH services, with a recent malware botnet linked to these activities.
  • State-backed hacking group using zero-day bugs in Cisco firewalls for cyber-espionage since November 2023.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?