- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
False positives can happen and do happen from time to time. Normally I would not create a CheckMates post for that.
But today, we got a quite big problem:
The original Check Point ThreatCloud feeds flagged the the whole cloudfront.net domain (not just specific sub domains) as phishing with confidence level set to high.
This results in huge problems:
We added TP exceptions, did TP policy install and everthing starts to recover.
We will now wait until CP delivers fixed feeds before removing our exception again.
Please see screenshot. The Action=detect was after we added the exception:
The problem started first in our logs at 23.02.2026 08:00 UTC and is still occuring about two hours later (covered by our exception).
That was an AV signature, which only exists in ThreatCloud (not in downloaded signatures).
Given I saw no other reports of this internally, I have to assume this was caught and addressed quickly.
Thanks for that clarification, Dameon. So I was wrong about the "won't fix itself", because the broken signature download had no side effect to the correction of the wrong classification.
However, 23.02.2026 08:22 UTC (first log entry) and 23.02.2026 12:48 UTC (last log entry) means aprox. 4,5 hours of blocking of one of the top 1000 domains, at least for customers who use ThreatCloud for DNS filtering.
Unfortunalty, the problem is back. Today, starting 24.02.2026 09:16 UTC, Check Point Thread Cloud is again classifying cloudfront.net as phishing. It still is, while I'm writing this.
What's going? Such a major false-positive two days in a row?
We don't see this. Do you have IoC configured?
We have indicators (custom IOC feeds) configured, but as you see in the screenshot in my first post, the vendor list is "Check Point ThreatCloud". When we have matches within our custom IOC feeds, we see the reference to that feed in the log card. But this one seems to be native from Check Point. The matching protection name today is the same like yesterday in my screenshot: "Phishing.TC.d16ePthE"
I have not seen any other reports of this issue, including in TAC cases.
I would get the TAC involved at this point.
Can confirm I also have a customer facing the same problems!
Like you said, major dns domains accross the internet are beeing blocked since a few days!
As Dameon suggest, I opened a TAC case and currently, it looks like a bug:
When you take a look at the screenshots, you see that it blocks cloudfront.net and not d2zvg5qlc6mxlr[.]cloudfront[.]net. This should not happen. This blocking occurs, when our recursive DNS server tries to resolve for example www.checkpoint.com over the root chain, because this a CNAME to d4epvaz4tpdrm.cloudfront.net and we have DNS-Sec enabled so our resolver asks for type=DS Name=cloudfront.net. This DS-Request for cloudfront.net is blocked by the protection Phishing.TC.d16ePthE.
So lets see, what RnD says. If I get a resolution for this problem, I will share it here with you folks.
Thanks for the details on this and definitely keep us posted!
Checkpoint TAC reported the same to me.
Looks like we need to wait until RnD is done.
Any updates from your side?
We are asked to provide a lot of data which may lead to downtime. By that it is not possible for us to provide..
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Thu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY