{"id":734,"date":"2024-10-15T11:50:56","date_gmt":"2024-10-15T11:50:56","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=734"},"modified":"2024-10-15T11:50:56","modified_gmt":"2024-10-15T11:50:56","slug":"alleged-cisco-data-breach-could-affect-microsoft-barclays-and-sap-developer-data","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=734","title":{"rendered":"Alleged Cisco data breach could affect Microsoft, Barclays, and SAP developer data"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Notorious hacker \u201cIntelBroker\u201d is offering to sell a large amount of sensitive data from Cisco allegedly stolen from a June 2024 breach along with two fellow hackers the threat actor called \u201cEnergyWeaponUser\u201d and \u201czjj.\u201d<\/p>\n<p>Cisco is reportedly investigating the breach claims after Intel Broker posted a sample of stolen data on BreachForums.<\/p>\n<p>\u201cCisco is aware of reports that an actor is alleging to have gained access to certain Cisco-related files,\u201d a Cisco spokesperson told BleepingComputers. \u201cWe have launched an investigation to assess this claim, and our investigation is ongoing.\u201d<\/p>\n<h2 class=\"wp-block-heading\">The breach affected customers\u2019 developer data<\/h2>\n<p>The breach allegedly affected a huge amount of developer data for a number of Cisco customers including big names such as Microsoft, Barclays, SAP, T-Mobile, AT&amp;T, and Verizon.<\/p>\n<p>According to a BreachForum <a href=\"https:\/\/x.com\/darkeye_team\/status\/1846023952575221848\/photo\/1\" target=\"_blank\" rel=\"noopener\">post<\/a> made by IntelBroker, the compromised data included source code, hardcoded credentials, certificates, API tokens, and more.<\/p>\n<p>\u201cCompromised data: GitHub projects, Gitlab Projects, SonarQube projects, Source code, hard-coded credentials, Certificates, Customer SRCs, Cisco Confidential Documents, Jira tickets, API tokens, AWS Private buckets, Cisco Technology SRCs, Docker Builds, Azure Storage buckets, Private &amp; Public keys, SSL Certificates, Cisco Premium Products &amp; More!,\u201d IntelBroker posted.<\/p>\n<p>IntelBroker also provided samples of the stolen data, which included a database, customer details, several customer-related documents, and screenshots from customer management portals.<\/p>\n<h2 class=\"wp-block-heading\">Highly active threat actor<\/h2>\n<p>One of the most frequent members of BreachForums, IntelBroker has had an extremely active year, having claimed several high-profile breaches in 2024.<\/p>\n<p>IntelBroker has a history of attacking a range of organizations, including <a href=\"https:\/\/www.csoonline.com\/article\/1249233\/ge-investigates-alleged-data-breach-into-confidential-projects-report.html\" target=\"_blank\" rel=\"noopener\">General Electric<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/2104251\/intelbroker-steals-classified-data-from-the-europol-website.html\" target=\"_blank\" rel=\"noopener\">Europol<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/2516119\/hackers-steal-data-of-200k-lulu-customers-in-an-alleged-breach.html\" target=\"_blank\" rel=\"noopener\">Lulu Hypermarket<\/a>, and <a href=\"https:\/\/www.csoonline.com\/article\/2099645\/zscaler-shuts-down-exposed-system-after-rumors-of-a-cyberattack.html\" target=\"_blank\" rel=\"noopener\">Zscaler<\/a>. The hacker\u2019s past breaches also involve prominent entities like Home Depot, Facebook Marketplace, and Space-Eyes.<\/p>\n<p>In June, IntelBroker began leaking or selling data from several companies, including <a href=\"https:\/\/www.scworld.com\/brief\/intelbroker-admits-experience-engine-hack\" target=\"_blank\" rel=\"noopener\">T-Mobile<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/2153951\/hackers-are-selling-stolen-amd-data-on-the-dark-web-in-exchange-for-crypto.html\" target=\"_blank\" rel=\"noopener\">AMD<\/a>, and <a href=\"https:\/\/www.google.com\/search?client=safari&amp;rls=en&amp;q=Apple+breach+intelbroker&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Apple<\/a>. Whether the Cisco breach is connected to these earlier June incidents remains unclear.<\/p>\n<p>While customers await the report from Cisco\u2019s investigation on the breach, IntelBroker is less likely to have made false claims as they have rarely done so in the past except in the case of Apple and Europol hacks where they <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2024\/06\/20\/has-apple-been-hacked-hacker-claims-june-2024-breach-exposes-source-code\/\" target=\"_blank\" rel=\"noopener\">exaggerate<\/a> the extent of the <a href=\"https:\/\/www.techradar.com\/pro\/security\/hackers-claim-to-have-breached-europol-web-portal-but-force-says-no-significant-data-stolen\" target=\"_blank\" rel=\"noopener\">breaches<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Notorious hacker \u201cIntelBroker\u201d is offering to sell a large amount of sensitive data from Cisco allegedly stolen from a June 2024 breach along with two fellow hackers the threat actor called \u201cEnergyWeaponUser\u201d and \u201czjj.\u201d Cisco is reportedly investigating the breach claims after Intel Broker posted a sample of stolen data on BreachForums. \u201cCisco is aware [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/734"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=734"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/734\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/735"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}