Security

Cyber-crime

HPE probes IntelBroker's bold data theft boasts

Incident response protocols engaged following claims of source code burglary


Hewlett Packard Enterprise (HPE) is probing assertions made by prolific Big Tech intruder IntelBroker that they broke into the US corporation's systems and accessed source code, among other things.

In a statement sent to The Register, HPE confirmed it was informed of the cyber criminal's claims late last week:

"HPE became aware on January 16 of claims being made by a group called IntelBroker that it was in possession of information belonging to HPE. HPE immediately activated our cyber response protocols, disabled related credentials, and launched an investigation to evaluate the validity of the claims.

"There is no operational impact to our business at this time, nor evidence that customer information is involved."

The attacker is selling the allegedly stolen data on a cybercrime forum, claiming to offer access to HPE source code taken from private GitHub repos, Docker builds, and SAP Hybris.

IntelBroker also claims that personally identifiable information (PII) of users is up for grabs, taken from old delivery records, and boasts they will sell access to APIs, WePay, self-hosted GitHub repos, and more.

The spokesperson did not respond to specific questions regarding the nature of the potentially affected data types.

As is the case with all claims made by career criminals, take them with a pinch of salt. The truth is often stretched, if there is any at all.

However, in the case of IntelBroker, the criminal fairly often makes good on their promises, albeit with some facts exaggerated here and there.

Europol, for example, confirmed its Platform for Experts was involved in an incident claimed by IntelBroker in May 2024. This followed claims that data was stolen from the Pentagon and other security agencies via consulting biz Acuity a month earlier. Acuity confirmed it was attacked but said no sensitive data was involved.

Days after the Pentagon claims, IntelBroker allegedly went after Home Depot, which later confirmed its employees' personal data was accessed. Other alleged attacks include those on AMD, Apple, Korea's Ministry of Defense, and the US Army.

IntelBroker is an admin of the cybercrime forum to which HPE's alleged data was posted and is also a known member of the Valhalla doxxing gang, which has associations with some of the more grisly types of cybercriminals out there.

Cybersecurity outfit Kela published an investigation into IntelBroker earlier this month, suggesting the group may also be part of the AgainstTheWest cybercrime group, which is known for attacking Chinese targets.

Kela also noted the attacker's reliance on a logless VPN service, which suggested their possible locations being in Serbia, Amsterdam, or Virginia, as well as their sophisticated tactics.

"IntelBroker represents the sophistication of today's cybercriminals – blending technical skill with strategic anonymity," the report reads. ®

Send us news
Post a comment

HPE says blocking Juniper buy is a sure Huawei to ensure China and Cisco thrive

Analyst argues stopping the deal benefits Switchzilla by preventing rise of strong challenger for AI networks

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

Thailand ready to welcome 7,000 trafficked scam call center victims back from Myanmar

It comes amid a major crackdown on the abusive industry that started during COVID

US minerals company says crooks broke into email and helped themselves to $500K

A painful loss for young company that's yet to generate revenue

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?