CHKP Check Point Software Technologies Ltd.

Avoiding Dating Disasters: Check Point Research Helps to Mitigate Significant Vulnerabilities in OkCupid’s Website and Mobile App

Avoiding Dating Disasters: Check Point Research Helps to Mitigate Significant Vulnerabilities in OkCupid’s Website and Mobile App

Check Point researchers demonstrate how a hacker could have accessed users’ sensitive data – full profile details, private messages, images and email addresses – on OkCupid, the leading free online dating platform

SAN CARLOS, Calif., July 29, 2020 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of (NASDAQ: CHKP), a leading provider of cyber security solutions globally, recently identified and helped mitigate several security flaws on OkCupid’s website and mobile app. If exploited, the vulnerabilities would have allowed a hacker to access and steal the private data of OkCupid users, and send messages from their account without users’ knowledge.

Launched in 2004, OkCupid is now one of the leading free online dating services globally with over 50 million registered users and used in 110 countries. In 2019, 91 million connections were made via the site annually, with an average of 50,000 dates arranged every week. During the Covid-19 pandemic, OkCupid has seen a 20% increase in conversations. However, the detailed personal information submitted by users also makes online dating services targets for threat actors, either for targeted attacks, or for selling on to other hackers.

Check Point researchers demonstrated that the vulnerabilities in OkCupid’s app and website could give a hacker access to a user’s full profile details, private messages, sexual orientation, personal addresses, and all submitted answers to OkCupid’s profiling questions. The flaws would also have enabled the hacker to manipulate the target user’s profile data and send new messages to other users from their account – enabling the hacker to impersonate the real user for further fraudulent or malicious activities.

Researchers detailed the three-step attack method which would have enabled a hacker to target users:

  1. The hacker generates a malicious link containing a targeted payload that initiates the attack
  2. The hacker sends the link to the intended target, or publishes it in a public forum for users to click on
  3. Once the victim clicks the link to open it, the malicious code is executed, giving the hacker access to the target’s account

Oded Vanunu, Head of Products Vulnerability Research at Check Point, said: “Our research into OkCupid, which is one of the most popular dating platforms, has raised some serious questions over the security of all dating apps and websites. We demonstrated that users’ private details, messages and photos could be accessed and manipulated by a hacker, so every developer and user of a dating app should pause to reflect on the levels of security around the intimate details and images that they host and share on these platforms. Thankfully, OkCupid responded to our findings immediately and responsibly to mitigate these vulnerabilities on their mobile app and website.”

Check Point researchers responsibly disclosed their findings to OkCupid. OkCupid acknowledged and fixed the security flaws in its servers, so users do not need to take any action. Following the disclosure and fixing of the vulnerabilities, OkCupid issued this statement: “Check Point Research informed OkCupid developers about the vulnerabilities exposed in this research and a solution was responsibly deployed to ensure its users can safely continue using the OkCupid app. Not a single user was impacted by the potential vulnerability on OkCupid, and we were able to fix it within 48 hours. We're grateful to partners like Check Point who with OkCupid, put the safety and privacy of our users first.”

For details of the vulnerabilities and a video showing how they could be exploited, visit .

Follow Check Point Research via:

Blog:

Twitter:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Emilie Beneitez LefebvreKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
EN
29/07/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Unveils Quantum Firewall Software R82.10 to Secur...

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection REDWOOD CITY, Calif., Dec. 04, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybr...

 PRESS RELEASE

Check Point Software Announces Pricing of Upsized Private Offering of ...

Check Point Software Announces Pricing of Upsized Private Offering of $1.75 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 03, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), a pioneer and global leader of cyber security solutions, today announced the pricing of $1.75 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The aggrega...

 PRESS RELEASE

Check Point Software Technologies Named a Leader in Gartner Magic Quad...

Check Point Software Technologies Named a Leader in Gartner Magic Quadrant for Email Security We Believe this Reinforces our Excellence in Email Security with AI-Powered Solutions that Combat Advanced Threats REDWOOD CITY, Calif., Dec. 03, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, announces that it has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security. Excelling across key areas such as core email protection, integrated email security, and outbound security, Check Point delivers AI-powered protect...

 PRESS RELEASE

Check Point Software Announces Proposed Private Offering of $1.5 Billi...

Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 02, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its intention to offer, subject to market conditions and other factors, $1.5 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, a...

 PRESS RELEASE

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing I...

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing It Discover how to build resilient, prevention-first AI security — from models and agents to cloud workloads and connectivity. Live on December 4 REDWOOD CITY, Calif., Dec. 02, 2025 (GLOBE NEWSWIRE) -- Artificial intelligence is transforming the enterprise at unprecedented speed. AI now underpins critical workloads, cloud operations, identity systems, code pipelines, and everyday collaboration tools. As these systems expand across hybrid cloud and edge environments, organizations face a new challenge: how to secure AI ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch