Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

HPE data breach is under investigation

"We are aware of the claims and are investigating their veracity."

byKerem Gülen
February 7, 2024
in Cybersecurity

The HPE data breach is currently under scrutiny by Hewlett Packard Enterprise as they delve into claims of a possible incursion, with a supposed threat actor allegedly offering stolen HPE credentials for sale on a cybercrime forum. Despite the assertions surrounding the data breach, HPE has informed that their investigations have yet to confirm any security compromise, and no demand for ransom has been made in connection with the incident.

Everything you need to know about HPE data breach

Adam R. Bauer, HPE’s Sr. Director for Global Communications, communicated to BleepingComputer:

“We are aware of the claims and are investigating their veracity. At this time we have not found evidence of an intrusion, nor any impact to HPE products or services. There has not been an extortion attempt.”

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The alleged seller, known by the moniker IntelBroker, provided a glimpse into the claimed breach by releasing screenshots that depict what they assert are HPE credentials. However, the origin and technique employed to acquire such data remain undisclosed.

HPE data breach
​The HPE data breach investigation has been intensified (Image: Kerem Gülen/Midjourney)

The individual behind the alleged HPE data breach has proclaimed on a notorious hacking forum:

“Today, I am selling the data I have taken from Hewlett Packard Enterprise. More specifically, the data includes: CI/CD access , System logs , Config Files , Access Tokens , HPE StoreOnce Files (Serial numbers warrant etc) & Access passwords. (Email services are also included).”

IntelBroker, the alias used by the threat actor in question, has previously gained notoriety for the significant breach of DC Health Link. This previous infringement resulted in the exposure of personal details pertaining to members and staff of the U.S. House of Representatives, subsequently triggering a congressional hearing.

This entity has also been associated with other cybersecurity infractions, including an intrusion into the Weee! grocery delivery service and an alleged compromise of confidential data from General Electric Aviation, further underscoring the severity of the HPE data breach claims.

Russian hackers breach HPE corporate email accounts

​The HPE data breach investigation has been intensified following Hewlett Packard Enterprise’s recent disclosure that, in May 2023, their Microsoft Office 365 email system fell victim to a cyber incursion. HPE attributes this breach to what they suspect are Russian hackers affiliated with the APT29 group, which is connected to the SVR, Russia’s Foreign Intelligence Service.

HPE acknowledged that these Russian hackers were able to exfiltrate SharePoint files and pertinent data from its cybersecurity and various other departments. The intrusion extended to HPE’s cloud infrastructure, with unauthorized access persisting until December. This was when HPE was notified of another breach within its cloud-based email system.

“On December 12, 2023, HPE was notified that a suspected nation-state actor had gained unauthorized access to the company’s Office 365 email environment. HPE immediately activated cyber response protocols to begin an investigation, remediate the incident, and eradicate the activity,” HPE stated.

“Through that investigation, which remains ongoing, we determined that this nation-state actor accessed and exfiltrated data beginning in May 2023 from a small percentage of HPE mailboxes belonging to individuals in our cybersecurity, go-to-market, business segments, and other functions.”

This revelation from HPE about the Russian-linked HPE data breach came just days after Microsoft reported a similar incident. In Microsoft’s case, APT29 managed to compromise email accounts of its high-level executives and employees, particularly those within the cybersecurity and legal sectors.

HPE data breach
This revelation from HPE about the Russian-linked HPE data breach came just days after Microsoft reported a similar incident (Image: Kerem Gülen/Midjourney)

Microsoft’s investigation found that the hackers accessed these corporate email accounts by exploiting a misconfigured test tenant account through a “password spraying” attack, wherein they guessed weak passwords until they broke through the account’s defenses.

In a historical context, HPE also suffered a security breach in 2018, which was linked to APT10, a group of Chinese hackers. This group also infiltrated IBM’s networks and utilized that breach to target HPE’s customers’ devices.

More recently, in 2021, HPE announced that its Aruba Central network monitoring platform’s data repositories were compromised. This breach allowed attackers to gain insight into information about the devices being monitored and their geographical locations.

In an update concerning the current HPE data breach, Bauer told that the data now circulating for sale was sourced from a testing environment, which may imply a potentially lower level of sensitivity compared to operational or production environments.

“Based on our investigation so far, the data at issue appears to be related to information that was contained in a test environment. There is no indication these claims relate to any compromise of HPE production environments or customer information. These are local credentials used in an isolated test environment and are not applicable to the production environment. In addition, these credentials alone would not allow access to production environments as we have multi-layered security measures in place. Furthermore, we don’t have any indication that these claims relate to any compromise of customer information. That said, we have taken additional measures to harden our environment further in relation to the credentials at issue.”

-Bauer


Featured image credit: HPE

Tags: Data BreachHPE

Related Posts

Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025
Hack an iPhone and Apple will pay you up to  million

Hack an iPhone and Apple will pay you up to $5 million

October 10, 2025
Microsoft: Cyber gang hijacks university salaries via Workday accounts

Microsoft: Cyber gang hijacks university salaries via Workday accounts

October 10, 2025
Shinyhunters extorts Red Hat over stolen CER data

Shinyhunters extorts Red Hat over stolen CER data

October 7, 2025

LATEST NEWS

Verizon down: Latest Verizon outage map for service issues

A critical Oracle zero-day flaw is being actively abused by hackers

Microsoft Copilot can now create documents and search your Gmail

Google Messages is about to get a lot smarter with this AI tool

Here is how WhatsApp will let you display your Facebook account

The Windows 10 doomsday clock is ticking for 500 million users

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.