Hello everyone,
I recently enabled URL Emulation feature in Click-Time Protection.
Today I was subscribing to some online service which required email validation.
So I went to the received email and clicked the link, but after redirecting to the final URL I got a message that the link was expired.
When I went back to the online service and tried to login my email was already validated, so everything worked in the end. Since the emulation happens on click-time, this would not be a vulnerability allowing someone to use my email without my consent to register to some site. It is just confusing for the user.
However, this got me thinking about the possible consequences of using this feature.
Before that, we were using only URL Reputation, but we had many false positives of user clicks in newsletters that used redirection services with low reputation like substack, while the final URL was fine. So I enabled emulation thinking that if Check Point validates that the final URL is OK, maybe I would get less false positives.
Does anyone care to share their experience?