Thursday, April 24, 2025
HomeCyber Security NewsCheck Point Confirms Data Breach, Says Leaked Information is 'Old'

Check Point Confirms Data Breach, Says Leaked Information is ‘Old’

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity giant Check Point has confirmed that a recent post on a notorious dark web forum, BreachForums, attempting to sell allegedly hacked data from the company, relates to an “old, known, and pinpointed event.”

The incident, according to Check Point, occurred in December 2024 and was thoroughly addressed at the time, with no ongoing security implications for the company or its customers.

The BreachForums post, created on March 30, 2025, by a user with the alias “CoreInjection,” claimed to possess sensitive Check Point data, reportedly including internal network maps, source code, and customer details.

- Advertisement - Google News

However, Check Point swiftly responded to these claims, discrediting the post as exaggerated, recycled information from a past security event.

The Nature of the Breach

According to a company spokesperson, the event originated in December 2024, stemming from the compromise of credentials tied to a portal account with limited access.

This portal, Check Point clarified, does not connect to any customer systems, production architecture, or critical security infrastructures.

The breach affected only three organizations, revealing limited data such as account names, product details, customer contact names, and a handful of employee email addresses.

No confidential customer systems or employee credentials were exposed, the company assured.

“CoreInjection’s claims represent a significant mischaracterization of the incident,” Check Point’s official statement read. “

There are no security implications or risks to Check Point customers or employees. This was an isolated, minor event, fully remediated months ago.”

Misinformation in the Hacker’s Claims

CoreInjection’s post included screenshots that purportedly showed an admin dashboard containing what appeared to be data on over 120,000 accounts, including 18,864 paying customers with detailed contract information stretching into 2031.

These claims, Check Point stated, were “false and exaggerated.” The company clarified that the portal involved in the December breach did not offer administrative-level privileges or access to such sensitive customer data.

Check Point added that the portal in question had robust internal mitigations in place, which prevented the breach from escalating into a more severe security incident.

The company did not comment directly on how CoreInjection obtained the compromised credentials but hinted at the possibility of phishing or credential-stealing malware like infostealers being involved.

Pending Clarifications and Further Action

The incident has triggered follow-up questions for Check Point, ranging from the exact timeline of the breach’s resolution to the origin of the compromised credentials.

While the company has assured customers that there is no risk, further investigation into the hacker’s claims and their possible motivations continues.

Check Point has not yet committed to making an official public statement beyond its initial response but may do so in the coming days to “calm the waters,” especially given the circulation of screenshots allegedly tied to the company’s databases.

While Check Point has provided reassurances that the incident is an outdated and inconsequential event, the emergence of CoreInjection’s claims highlights the persistent risks of misinformation and the complexities of managing cybersecurity breaches.

For now, customers and industry observers await further updates, hoping for clarity and additional details to bring closure to the matter.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...