Cisco Investigates Alleged Data Breach: Hacker Claims Stolen Developer Data from Microsoft, SAP, Barclays, and More
Amar Thakare
CEO | 12+ years Cyber Security Expert | Founder | CISO | Mentor | Protecting Organizations from Cyber Threats | Risk Management | Incident Response | Compliance | Information Security Governance | Penetration Tester
A well-known cybercriminal, IntelBroker, has made alarming claims of breaching Cisco and stealing sensitive data. In a post on the notorious BreachForums, IntelBroker, along with two accomplices, allegedly infiltrated Cisco’s systems on October 6th, 2024, and extracted a vast amount of confidential information. The stolen data reportedly includes everything from source code and hardcoded credentials to API tokens, certificates, and customer documents.
This includes major players like Microsoft, Barclays, SAP, T-Mobile, Verizon, and AT&T, where its developer's information, among other things, may have been compromised during this breach.
Cisco said it was aware of the allegations and was doing an intense investigation on this issue. "We have launched an investigation into this allegation and our investigation is ongoing," remarked a Cisco spokesperson. The company had not yet found evidence that its systems were affected but has contacted law enforcement and will inform customers if their information was affected.
The record of IntelBroker lends credibility to this line of claims. He is said to have breached the systems of General Electric, T-Mobile, and AMD, among some of the high-profile breaches he made this year. Some of the earlier claims already proved exaggerated, as is the case with those that make reference to Europol, yet the possible scale of breach is quite big, and among the leaked documents, more than 800 companies were allegedly mentioned.
领英推荐
This incident raises important questions about third-party risk and the ongoing challenges in securing developer and cloud environments. As Cisco continues to investigate, organizations must remain vigilant, reviewing their security measures and monitoring for signs of any potential compromise.
The cybersecurity community will be closely watching this case unfold. In the meantime, businesses affected or at risk should consider proactive steps like identity theft protection and robust phishing defense strategies to safeguard their sensitive information.
Key Takeaways:
Chief Executive Officer at Crygma LTD. Data Cyber Defense Consultants. Counter Espionage & Counter Intelligence Cipher Systems. The Highest Level of Cyber Defense for Secret Critical Data
2 周Interesting. Insightful! Of course some steps should be taken before a database breach occurs such as making sure that all the most sensitive data is fully encrypted. Data that cannot be read is useless to cyber criminals