Close Menu
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Is SanDisk the new Nvidia?

Apple begins testing end-to-end encrypted RCS messages on iPhone

Meta’s privacy-invading features for smart glasses prove it doesn’t care what users think

Facebook X (Twitter) Instagram
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram Pinterest Vimeo
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World
Karachi Chronicle
You are at:Home » Hackers claim to have breached Hewlett Packard Enterprise, list data will be sold
Tech

Hackers claim to have breached Hewlett Packard Enterprise, list data will be sold

Adnan MaharBy Adnan MaharJanuary 20, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Hacker IntelBroker claims to have infiltrated Hewlett Packard Enterprise (HPE) and exposed sensitive data including source code, certificates, and PII, which is now being sold online.

The notorious IntelBroker hacker and his associates have claimed responsibility for a breach at Hewlett Packard Enterprise (HPE), a Houston, Texas-based global company that provides technology solutions to enterprises.

The hacker, who has previously been implicated in several high-profile data breaches, is now selling the allegedly stolen data, using Monero to maintain anonymity and untraceability. (XML) Requesting payment in cryptocurrency.

This was revealed by the hacker himself on Hackread.com and later published on Breach Forums, a cybercrime and data breach forum run by the hacker. In an exclusive conversation with Hackread.com, IntelBroker said the breach was the result of a direct attack on HPE’s infrastructure and did not include compromising third-party access, as is common in recent attacks. claimed that it was not.

What does the allegedly stolen data contain?

IntelBroker also shared a data tree and two screenshots purportedly taken from the company’s internal infrastructure. The data tree analyzed by Hackread.com appears to refer to a development or system environment that involves both open source software and proprietary package management systems.

In addition, hackers have access to sensitive data including source code, private GitHub repositories, Docker builds, certificates (both private and public keys), product source code belonging to Zerto and iLO, and user data such as old PII related to shipping. He claims to have extracted the . Get access to APIs, WePay, self-hosted GitHub repositories, and more.

Hackers claim to have breached Hewlett Packard Enterprise, list data will be sold
IntelBroker on Infringement Forum Alleging Hewlett Packard Enterprise (HPE) Infringement Credit: Hackread.com

Hackread.com’s initial analysis of the alleged data tree made several findings consistent with the hackers’ claims. The directory structure contains private keys and certificates such as ca-signed.key and hpe_trusted_certificates.pem, indicating potential exposure to sensitive cryptographic material.

Source code exists for HPE products such as iLO and Zerto, and files such as ilo_client.py and zerto_bootstrapper.py suggest leaked proprietary implementations. References to .github directories and .tar archives in private repositories further indicate compromised development assets.

Additionally, the presence of files such as VMW-esx-7.0.0-hpe-zertoreplication.zip and ZertoRunner.exe indicates that compiled software packages and deployment files may be compromised. If verified by HP, this could be a major security incident.

The following image combines two screenshots shared by the hacker and provides detailed insight into Hewlett Packard Enterprise’s internal systems. The first screenshot shared by the hacker shows details of Hewlett Packard Enterprise’s internal SignonService web service. This image shows the service’s endpoint address, WSDL link, and implementation class, potentially exposing sensitive infrastructure information.

The second screenshot reveals sensitive configuration details from Hewlett Packard Enterprise’s internal systems. This image exposes credentials for Salesforce and QID integration, an internal URL for the SAP S/4 HANA quoting service, and a placeholder email address for error logs, indicating a serious security vulnerability within the HPE infrastructure. gender may be exposed. ”

Hackers claim to have breached Hewlett Packard Enterprise, list data will be sold
Credit: Hackread.com

What is the difference between HPE and HP?

Although the names Hewlett-Packard Enterprise (HPE) and HP Inc. are often used interchangeably, they are two different companies with different focuses. In 2015, Hewlett-Packard was split into two separate entities. HP Inc. continues to specialize in consumer products such as laptops, desktops, and printers, while Hewlett-Packard Enterprise (HPE) provides enterprise-level IT solutions such as servers, storage, networking, and cloud computing. We are focusing on

Both companies are independent, with independent ownership and management. It is important to mention this distinction because the reported breach specifically targets HPE and not HP Inc.

HPE and cybersecurity incidents – not a one-off

This is not the first time HPE has faced a cybersecurity incident. In January 2024, the company disclosed to the SEC that Russian state-sponsored hackers associated with Midnight Blizzard (also known as Cozy Bear) had infiltrated its servers. The attack, which began in May 2023, targeted a small number of HPE mailboxes belonging to employees in cybersecurity, go-to-market, business departments, and other critical roles, resulting in data theft.

Immediately after the CICSO incident

Intel Broker is known for large-scale data breaches. In October 2024, hackers announced they had broken into Cisco and stolen terabytes of data. Cisco later confirmed that the stolen data came from a public DevHub resource that was exposed without password protection and was misconfigured for hackers to download.

In November 2024, hackers claimed to have infiltrated Nokia through a third-party contractor. The data was sold for $20,000. The same hacker boasted about breaking into AMD (Advanced Micro Devices, Inc.) and stealing employee and product information.

This is a developing story. Hackread.com is closely monitoring the situation and will provide updates as new information becomes available. Please stay tuned for further information.

Related topics

Hackers leak details of over 10,000 Dell employees Acer data breach: Hackers sell 160GB of stolen data Dell discloses data breach as hackers sell 49 million user data including SSN National public data records dumped online Trello data breach: hackers dump personal information of millions of users

Hackers steal call records and text messages of ‘nearly all’ AT&T customers



Source link

Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
Previous ArticleMacron tells Europe to wake up and spend more on defense as Trump takes office
Next Article Dell Technologies, NSDC, Learning Links Foundation launched seven solar -powered community hubs in India and supported unonfused technology needs
Adnan Mahar
  • Website

Adnan is a passionate doctor from Pakistan with a keen interest in exploring the world of politics, sports, and international affairs. As an avid reader and lifelong learner, he is deeply committed to sharing insights, perspectives, and thought-provoking ideas. His journey combines a love for knowledge with an analytical approach to current events, aiming to inspire meaningful conversations and broaden understanding across a wide range of topics.

Related Posts

Is SanDisk the new Nvidia?

February 17, 2026

Apple begins testing end-to-end encrypted RCS messages on iPhone

February 16, 2026

Meta’s privacy-invading features for smart glasses prove it doesn’t care what users think

February 16, 2026
Leave A Reply Cancel Reply

Top Posts

20 Most Anticipated Sex Movies of 2025

January 22, 2025870 Views

President Trump’s SEC nominee Paul Atkins marries multi-billion dollar roof fortune

December 14, 2024138 Views

How to tell the difference between fake and genuine Adidas Sambas

December 26, 2024137 Views

Alice Munro’s Passive Voice | New Yorker

December 23, 202492 Views
Don't Miss
AI February 13, 2026

D Street Massacre, Humanity Milestones, Bangladesh Election Results, PMO Shift, and More

Top 10@10 — CNBC-TV18’s daily newsletter featuring the top 10 articles on markets, company updates,…

A smarter way for AI to understand text and images

Surprisingly Tough Competition for Meta’s Ray-Ban

How AI assistance impacts the formation of coding skills \ Anthropic

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Karachi Chronicle, your go-to source for the latest and most insightful updates across a range of topics that matter most in today’s fast-paced world. We are dedicated to delivering timely, accurate, and engaging content that covers a variety of subjects including Sports, Politics, World Affairs, Entertainment, and the ever-evolving field of Artificial Intelligence.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Is SanDisk the new Nvidia?

Apple begins testing end-to-end encrypted RCS messages on iPhone

Meta’s privacy-invading features for smart glasses prove it doesn’t care what users think

Most Popular

Anthropic agrees to work with music publishers to prevent copyright infringement

December 16, 20070 Views

chatgpt makers claim data breach claims “seriously”

July 14, 20170 Views

Everything you need to know

September 29, 20210 Views
© 2026 karachichronicle. Designed by karachichronicle.
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.