Cisco Data Were Leaked Again : IntelBroker Updates Users With Additional Leaked Data

Cisco

Hi Users As everyone is aware, Cisco suffered a breach a while back, and the hacker using the identity Intelbroker extorted an enormous amount of data from the company’s breachform. When he returned, he uploaded the subsequent set of data. The total amount of data was 4.84 GB. He compromised almost 4.5 TB of data in all. Let us have a look at what all of this data contains.

Background Of The Breach

Users were already informed about the breach by Hackingblogs at the time it occurred, so you may go there and take a closer look. For ease of reading, I shall briefly describe the situation.

A well-known threat actor called IntelBroker made an offer to sell private information taken from a Cisco hack on October 6, 2024, via a post on BreachForum on October 14, 2024.

Cisco’s intellectual information and client privacy were seriously threatened when IntelBroker released examples of the reportedly stolen data, including customer databases, private papers, and images of customer administration interfaces.

This material included, in short, Source Code, hard-coded credentials, certificates and keys, confidential documents, API tokens, storage buckets, and other sensitive information such as Docker builds, Cisco premium goods, and jira tickets.

The Next Round Of Data

Thus, Intelbroker’s Christmas Eve Breach Forums article includes 4.84 GB of data, which is a portion of a reportedly stolen 4.5 TB. We will examine the conclusions that Hackread came at after analysing this data.

This data leak contained a lot of sensitive information, such as cloud server disc images, cryptographic signatures for payment SDKs like Weixin Pay, network-related files like Cisco XRv9K virtual router images and configurations, testing logs and scripts, operational data like Zero Touch Provisioning (ZTP) logs and packages, and proprietary software development artefacts like Java binaries, source code, and application archives.

Configuration files, internal project archives, and other irregular documents are also included in the breach, which may reveal network setups, operational insights, and intellectual property.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top