Close Menu
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

The world’s largest air force with the F-35 fleet in 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Among the most troublesome relationships in healthcare AI

Facebook X (Twitter) Instagram
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram Pinterest Vimeo
Karachi Chronicle
  • Home
  • AI
  • Business
  • Entertainment
  • Fashion
  • Politics
  • Sports
  • Tech
  • World
Karachi Chronicle
You are at:Home » Hacker plans to assert the second violation in HP enterprise and sell access
Tech

Hacker plans to assert the second violation in HP enterprise and sell access

Adnan MaharBy Adnan MaharJanuary 28, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Intelbroker, targeting Hewlett-Packard Enterprise (HPE), claiming that it can access the company’s internal infrastructure, and argues that it will sell it to access instead of selling data.

Intelbroker, a notorious hacker linked to a previous famous cyber attack, has announced suspected data violation of Hewlett-Packard Enterprise (HPE). The hacker claims that it has been cloned by accessing new data from the HPE repository.

The size of the data charged is 500 MB, but it is relatively smaller than usual, but the screenshot shared only with hackread.com provides insights on what looks like an infringed infrastructure. , Reveal the published qualification information, internal configuration, and unique source code.

This latest violation is the second violation of Intelbroker targeting Hewlett Packard Enterprise. In January 2025, as reported by Hackread.com, Intelbroker publicly asserted the responsibility for damaged HPE infrastructure in a previous attack. The violation disclosed through the violation forum and the exclusive conversation with hackread.com included the substantial removal of confidential data.

The latest claim

According to the quick analysis of data trees and internal screenshots seen by hackread.com, the unique source of HPE products such as some confidential data, ILO and Zerto systems, internal Git repository, and Docker build, such as private keys and certificates. It pointed out the possibility of extracting code.

In addition, the data tree has access to exposed infrastructure configurations such as internal services and endpoints, such as internal services and Salesforce integration, internal DNS, deployment pipeline, etc. It is said that it was done.

Hacker plans to assert the second violation in HP enterprise and sell access
Screenshot provided by intelbroker to Hackread.com

Plan to sell access

First of all, on suspicion of HPE violation, Intelbroker provided stolen data for sales and maintained anonymous by requesting payment at Monero Cryptocurrency. However, this time, the hackers argue that the entire dataset will be released for free and will sell access.

“I don’t know if I will sell data. It may only leak it for free this time, but I don’t know yet, but my team may have sold access to HPE infrastructure.

Intelbroker told Hackread.com.

Nevertheless, the new HPE data violation has shown an urgency for the organization to secure infrastructure, regularly audit access control, and monitor suspected activities. When verified, this violation represents the main case of HPE and has a long -term effect on management and customer trust.

HPE is not HP Inc.

Hewlett-Packard Enterprise (HPE) and HP Inc. are two separate entities that occurred from the split of Hewlett-Packard in 2015. HPE focuses on enterprise -level IT solutions, including servers, storage, networking, cloud computing, and software services. For companies.

In contrast, HP Inc. specializes in consumers and small and medium -sized enterprises and specializes in personal computing devices and printer. They share common origin, but their operation and focus area are completely different.

hackread.com contacted HPE for a statement. The answer from the company will be added to this article as soon as it is received. Look forward to the update!

Related topic

Hacker Leak more than 10,000 DELL EMPLOYEE Details Acer Data Invasion: Hackers sell 160GB stolen data DELL discloses data infringement.



Source link

Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
Previous ArticleWhich Artists Will Have Big Nights?
Next Article How does DeepSeek R1 work on Openai’s best inference model?
Adnan Mahar
  • Website

Adnan is a passionate doctor from Pakistan with a keen interest in exploring the world of politics, sports, and international affairs. As an avid reader and lifelong learner, he is deeply committed to sharing insights, perspectives, and thought-provoking ideas. His journey combines a love for knowledge with an analytical approach to current events, aiming to inspire meaningful conversations and broaden understanding across a wide range of topics.

Related Posts

Googleबनी$ 3

September 16, 2025

Tesla engineers will resign in eight years. He points out CEO Elon Musk as the main reason, accusing him of “liing to the public and manipulating him…”

September 12, 2025

Ant Group unveils its own Tesla Optimus competitor, R1 humanoid robot

September 11, 2025
Leave A Reply Cancel Reply

Top Posts

20 Most Anticipated Sex Movies of 2025

January 22, 2025458 Views

President Trump’s SEC nominee Paul Atkins marries multi-billion dollar roof fortune

December 14, 2024122 Views

How to tell the difference between fake and genuine Adidas Sambas

December 26, 202486 Views

Alice Munro’s Passive Voice | New Yorker

December 23, 202474 Views
Don't Miss
AI September 25, 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Machine learning models can speed up discovery of new materials by making predictions and proposing…

Among the most troublesome relationships in healthcare AI

Does access to AI become a fundamental human right? Sam Altman says, “Everyone would want…”

Google’s Gemini AI is on TV

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Karachi Chronicle, your go-to source for the latest and most insightful updates across a range of topics that matter most in today’s fast-paced world. We are dedicated to delivering timely, accurate, and engaging content that covers a variety of subjects including Sports, Politics, World Affairs, Entertainment, and the ever-evolving field of Artificial Intelligence.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The world’s largest air force with the F-35 fleet in 2025

AI systems learn from many types of scientific information and run experiments to discover new materials | MIT News

Among the most troublesome relationships in healthcare AI

Most Popular

10 things you should never say to an AI chatbot

November 10, 20040 Views

Character.AI faces lawsuit over child safety concerns

December 12, 20050 Views

Analyst warns Salesforce investors about AI agent optimism

July 1, 20070 Views
© 2025 karachichronicle. Designed by karachichronicle.
  • Home
  • About us
  • Advertise
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.