ARE YOU VULNERABLE TO NEW TYPES OF ATTACKS?
CheckMe service simulates many types of attacks that can compromise your computer and the information on your network.
This service includes series of tests that check the vulnerability of your network, endpoint, cloud and mobile to
Ransomware, Phishing, Zero Day, Bot communication, Browser Exploit, Anonymize usage and Data leakage.

CheckMe assessment for Network, Endpoint and Cloud environments
-
Go to http://www.cpcheckme.com and select the environments you wish to assess (Network, Endpoint and/or Cloud).
-
CheckMe runs independently and analyzes your environments.
-
Your web browser communicates with CheckMe service to analyze your network's security controls (without any actual risk for your network).
Example of final results page:

-
Click on the "GET FULL REPORT
" button at the bottom to receive a detailed report with results and
remediation guidelines to your e-mail (will be sent From "CheckMe@checkpoint.com
"
with Subject "CheckMe Report
"; example report for a vulnerable network).
What threats are being checked?
CheckMe simulates various scenarios that could be a starting point for the following attack vectors:
 |
Ransomware is an attack that takes advantage of a particular vulnerability in a computing system. |
 |
Command & Control Communication let attackers take complete control over an infected computer. |
 |
Identity Theft attack captures personal information by fake websites that appears to be legitimate. |
 |
Zero Day attacks use the surprise element to exploit holes in the software that are unknown to the vendor. |
 |
Malware Infection is used to gather guarded information or disrupt corporate, governance and individual operation. |
 |
Browser Exploit is an attack that takes advantage of a particular vulnerability in a computing system. |
 |
Persistent Malware is a continuous computer hacking processes targets private organizations or states for business or political motives. |
 |
Anonymous surfing allows users to hide their online activity. It can open backdoor into an organization's network. |
 |
Data leakage is the transfer of classified or sensitive information outside an organization's network by theft or accidental exposure. |
 |
Cloud Segmentation scans for open ports of accessible machines within the same environment to indicate for access control lacking. |
Tests Specifications & Remediation Guidelines
The table below summarizes different attacks that were used during the simulation and explanation how to remediate each attack.
CheckMe application for your Android device
Show / Hide this section
- Search for CheckMe app in Google Play.


- Download CheckMe app into your mobile device.
- Start the scan in your mobile device and find your exposure to operational system vulnerabilities, SMiShing, malicious applications and malicious files.


Tests Specifications & Remediation Guidelines for CheckMe Mobile application
The table below summarizes the mobile device tests that were used during the mobile scan and explain how to remediate each threat.
Threat |
Test Description |
Remediation Guidelines |
Root Checker |
CheckMe app scans your device and check if the device is rooted and exposed to security flaws and vulnerabilities.
|
Improve your security with Check Point Sandblast Mobile.
In addition, it is recommended to backup and restore your device.
|
Unknown Source |
CheckMe app scans your device and check if the ability to install application from unknown sources is turned on.
Installing applications from unknown sources can risk your device and privacy.
|
It is recommended to install applications only from trusted sources. Disable unknown source applications.
|
USB Debugging |
CheckMe app scans your device and checks if USB debugging is turned on. USB debugging mode is designed for development use only. When turned on, your private data might be at risk.
|
It is recommended to disable USB debugging mode. |
Malicious Applications |
CheckMe app scans your device and checks if malicious applications have been installed. If a malicious application has been installed, the device can be compromised, be tracked and lose sensitive information. |
Improve your security with Check Point Sandblast Mobile. Remove the malicious applications from your device. |
Malicious Files |
CheckMe app scans your device and checks if any malicious files have been saved on the device. If malicious files exist on the device, it can be compromised, be tracked and lose sensitive information.
|
Improve your security with Check Point Sandblast Mobile.
Remove the malicious filed from your device.
|
Note that CheckMe app is currently supported for Android devices only.
FAQ
Show / Hide this section
-
Can CheckMe cause any damage to a computer that runs these tests?
All tests are secured and there is no risk to the user's devices and network.
The administrator may see alerts in the security system that notify about the tests simulation.
-
Does CheckMe test my computer or my network security?
With the new version of CheckMe it is possible to assess the customer's network, endpoint or cloud environments (AWS/Azure). The users should select the environments they wish to assess in the welcome page.
-
How CheckMe simulates the threats?
Network and Cloud assessment:
CheckMe uses JavaScript functions that run in the context of the page and do the following:
- Download a “malicious” file from cpcheckme.com over HTTP, HTTPS and ZIPed
- Post “sensitive” data to cpcheckme.com
- Load images from bad domains (domains with bad reputation)
Endpoint:
CheckMe download a binary to the customer's desktop which simulates the "malicious" behaviour.
Each threat includes one or more test that can take part in the attack vector. For example: The final phase of bot infection is the use of command and control sites for remote administration of the malware. CheckMe simulates the C&C protocol, which can be a part of the bot infection threat and can indicate if the network is exposed to bot infection.
-
Why is CheckMe flagged as not secure by a browser when you open the URL?
Since there are tests over http, the site must be http as well. That does not mean that the site is not secured.
Revision History
Show / Hide this section
Date |
Description |
20 Mar 2018 |
- Updated the tests table.
- Added 2 new threats
|
19 Oct 2017 |
- Updated the description of "Identity Theft / Phishing Attack".
|
25 Sep 2017 |
- Updated the link to favicon.ico file for "Anonymizer usage".
|
27 Aug 2017 |
- Updated the description of "Browser attack".
|
26 July 2017 |
- Updated the links to favicon.ico file for "Identity Theft / Phishing Attack".
- Updated the link to favicon.ico file for "Anonymizer usage".
|
23 July 2017 |
- Updated the links to favicon.ico file for "Identity Theft / Phishing Attack".
|
15 Mar 2017 |
- Updated the description of and remediation guidelines for "Zero Day Attack".
- Updated the description of and remediation guidelines for "Identity Theft / Phishing Attack".
|
02 Mar 2017 |
- Updated the description of "Ransomware attack".
- Updated the description of and remediation guidelines for "Browser attack".
- Added a note that Sensitive data leakage tests are not supported for Capsule Cloud.
|
20 Feb 2017 |
- Removed "Beta Version" from the article title.
- Renamed from "Browser Code Injection" to "Browser attack".
- Updated the tests that simulate a "Browser attack".
- Improved the remediation guidelines for "Browser attack".
- Added a note that Ransomware Attack tests are not supported for 600/700/1100/1200R/1400 appliances.
|
12 Feb 2017 |
- Improved the remediation guidelines for "Zero Day Attack".
|
07 Feb 2017 |
- Improved all the remediation guidelines.
|
05 Feb 2017 |
- Changed the design of this article.
- Upgraded the CheckMe service.
|
09 Jan 2017 |
|
09 Jan 2017 |
- Added notes that this service simulates the attacks without any actual risk for customer's environment.
|
05 Jan 2017 |
- First release of this article.
|