Hewlett Packard Enterprise (HPE) investigates new violations after threatening actors have stolen documents from the company’s developer environment.
The company told BeleamingComputer that although no evidence of security infringement was found, it was investigating threat actors.
“HPE began to notice that the group called Intelbroker had information belonging to HPE on January 16,” said Spokesman Claire Roxley to BleepingComputer. 。
“HPE has immediately started a survey to enable cyber response protocols, disable relevant qualifications, and evaluate the validity of claims. At this time, there is no operational impact on our business, and customer information is available. There is no evidence of being involved.
Intelbroker, which announced the sale of information, which is said to have been stolen from the HPE network, has accessed a company API, Wepay, (private and public) GitHub repository for at least two days, certificate (private and public keys), Zerto. , And claims that he stealed the steal. ILO source code, Docker build, and personal information of old users used for distribution.

Intelbroker has posted another archive (including qualification information and access token) on February 1, 2024, stolen from the HPE system. The company also stated that it was investigating the threat actor’s claim but had no evidence. Of security violations.
Intelbroker was notorious after violating the DC Health Link, an organization that manages the healthcare plan of the U.S. House of Representatives.
Incidents related to Intelbroker include Nokia, Cisco, Europol, Home Depot, AMD violations, the Ministry of State, Zscaler, Ford, and General Electric Aviation.
HPE was violated in 2018, when APT10 Chinese hackers infringed a portion of the system and used access to use hacking customer devices.
Recently, in 2021, Tech Giant has revealed that the data lipostration of the Aruba Central Network Monitoring platform has been infringed, and the attacker has been able to access the monitored devices and the location data.
HPE is also considered to be part of the APT29 Hacking Group, which was linked to the Microsoft Office 365 email environment a year ago in May 2023 to the Russian foreign INTELLIGENCE (SVR). I revealed that the attacker violated.