Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

HPE Investigating Breach Claims Involving Source Code: Report

CRN by CRN
January 21, 2025
Home News
Share on FacebookShare on Twitter


The allegations of a breach come from a threat actor that had previously compromised an HPE test environment in early 2024.

Hewlett Packard Enterprise acknowledged it is investigating claims by a threat actor that reportedly involve theft of source code.

While the IT infrastructure giant did not confirm that a data breach occurred, the allegations come from a threat actor that had previously compromised an HPE test environment in early 2024.

[Related: 10 Major Ransomware Attacks And Data Breaches In 2024]

BleepingComputer reported Monday that a hacker known as IntelBroker has been attempting to sell information that was allegedly taken from HPE.

According to the report, the threat actor claimed to have stolen data including source code for HPE’s Zerto disaster recovery platform and Integrated Lights-Out (iLO) server management software, as well as Docker builds and certificates. The hacker claimed to have had access to HPE’s API, GitHub repositories and WePay for “at least two days,” the BleepingComputer report said.

In a statement provided to outlets including CRN, HPE acknowledged it has undertaken an investigation into the claims after becoming aware of the allegations last week.

“HPE became aware on January 16 of claims being made by a group called IntelBroker that it was in possession of information belonging to HPE,” the company said in the statement. “HPE immediately activated our cyber response protocols, disabled related credentials, and launched an investigation to evaluate the validity of the claims.”

HPE, however, has seen “no operational impact to our business at this time, nor evidence that customer information is involved,” the company said in the statement.

A year ago, after the hacker known as IntelBroker claimed to be selling data belonging to HPE, the company confirmed that some of its data was impacted in a breach but said that the scope was not as extensive as claimed by the threat actor.

“The data at issue appears to be related to information that was contained in a test environment,” HPE said at the time.

In its statement to CRN, HPE did not address questions from CRN about whether the new claims by this threat actor might be related to the 2024 incident.



Source link

Tags: CyberattacksCybersecuritynetwork security
CRN

CRN

Next Post
Crypto market will see a new all-time high in 2025, Binance CEO says

Crypto market will see a new all-time high in 2025, Binance CEO says

Recommended.

Steer Health Launches SteerConnect: The First AI-Powered Digital Gateway to Streamline Patient Care Access

Steer Health Launches SteerConnect: The First AI-Powered Digital Gateway to Streamline Patient Care Access

March 21, 2025
The 20 Coolest Security Operations, Risk And Threat Intelligence Companies Of 2026: The Security 100

The 20 Coolest Security Operations, Risk And Threat Intelligence Companies Of 2026: The Security 100

February 18, 2026

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio