Check Point VPNs Under Siege: Hackers Exploit Weak Passwords in Global Attack Wave
Check Point warns that threat actors are targeting its Remote Access VPN devices, exploiting old local accounts with weak, password-only authentication. To combat this, customers should switch to more secure authentication methods or delete vulnerable accounts.

Hot Take:
Looks like Check Point VPNs are the new “it” target for hackers, and it’s time to say goodbye to those old, weak passwords. Hackers are treating them like they’re on a treasure hunt, and we all know how that usually turns out. Spoiler: Not good for the treasure owner.
Key Points:
- Check Point warns of attacks on Remote Access VPN devices using insecure password-only authentication.
- Advised customers to switch to more secure authentication methods or delete old local accounts.
- Released a hotfix to block weak password-only local accounts from accessing VPNs.
- Cisco also reports similar attacks targeting their VPN and SSH services, with a recent malware botnet linked to these activities.
- State-backed hacking group using zero-day bugs in Cisco firewalls for cyber-espionage since November 2023.
Already a member? Log in here