Check Point VPNs Under Siege: Hackers Exploit Weak Passwords in Global Attack Wave

Check Point warns that threat actors are targeting its Remote Access VPN devices, exploiting old local accounts with weak, password-only authentication. To combat this, customers should switch to more secure authentication methods or delete vulnerable accounts.

Hot Take:

Looks like Check Point VPNs are the new “it” target for hackers, and it’s time to say goodbye to those old, weak passwords. Hackers are treating them like they’re on a treasure hunt, and we all know how that usually turns out. Spoiler: Not good for the treasure owner.

Key Points:

  • Check Point warns of attacks on Remote Access VPN devices using insecure password-only authentication.
  • Advised customers to switch to more secure authentication methods or delete old local accounts.
  • Released a hotfix to block weak password-only local accounts from accessing VPNs.
  • Cisco also reports similar attacks targeting their VPN and SSH services, with a recent malware botnet linked to these activities.
  • State-backed hacking group using zero-day bugs in Cisco firewalls for cyber-espionage since November 2023.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here