HPE investigating alleged data breach claims

HPE investigating alleged data breach claims

Hewlett Packard Enterprise (HPE) has launched an investigation following claims of a data breach made by a cybercriminal known online as IntelBroker, who recently posted an announcement on the BreachForums hacker forum offering stolen data allegedly obtained from the tech giant.

On January 16, IntelBroker, known for previous attacks on companies such as DC Health Link, Nokia, Cisco, and others, claimed responsibility for compromising HPE's internal systems. In a new post, the hacker shared details about the breach, stating that they, along with partners zjj and EnergyWeaponUser, had been “connecting to some of their services for about two days now.”

According to the post, the stolen data includes a range of sensitive information such as source code from private GitHub repositories, Docker builds, SAP Hybris, and certificates, including both private and public keys. Additionally, the hacker claimed to have accessed product source code for Zerto and iLO, user data, access to APIs, and various services, including WePay, GitHub, and others.

In response to the allegations, HPE confirmed it became aware of the claims on the same day they were made and swiftly took action. A spokesperson for the company, Clare Loxley, provided a statement to BleepingComputer, noting that the company had activated its cyber response protocols, disabled the affected credentials, and launched an investigation into the claims.

As of now, HPE has not found any indication that customer data was compromised, and the investigation is ongoing.


Back to the list

Latest Posts

Four key distributors of encrypted communications service Sky ECC arrested in Spain and Netherlands

Four key distributors of encrypted communications service Sky ECC arrested in Spain and Netherlands

The two men arrested in Spain are accused of overseeing the global distribution of Sky ECC devices and software.
12 February 2025
Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools

Sandworm APT targets Ukraine with trojanized Microsoft KMS activation tools

The attackers utilized a BACKORDER loader to deploy DarkCrystal RAT.
12 February 2025
North Korean Kimsuky adopted a new tactic to infiltrate targets

North Korean Kimsuky adopted a new tactic to infiltrate targets

The new tactic involves the threat actor tricking individuals into executing PowerShell commands as administrators.
12 February 2025