14.2 C
New York
Wednesday, November 20, 2024

Cisco takes DevHub portal offline after hacker posts stolen information


Cisco confirmed immediately that it took its public DevHub portal offline after a risk actor leaked “private” information, however continues to state that there isn’t any proof that its methods had been breached.

“We have now decided that the information in query is situated in a public DevHub setting: a Cisco useful resource heart that enables us to assist our group by making software program code, scripts, and many others. accessible for purchasers to make use of as wanted” , reads in a up to date assertion from Cisco.

“At this stage of our investigation, we have now decided {that a} small variety of information might have been posted that weren’t licensed for public obtain.”

Cisco says there isn’t any indication that non-public data or monetary information was stolen, nevertheless it continues to analyze what information might have been accessed.

This assertion comes after a risk actor often known as IntelBroker claimed to have breached Cisco and tried to promote stolen firm information and supply code.

Cisco data for sale on hacking forum
Cisco information on the market on hacking discussion board
Supply: BleepingComputer

BleepingComputer spoke to IntelBroker in regards to the alleged breach, who stated it gained entry to a third-party Cisco developer setting by means of an uncovered API token.

Throughout the Cisco investigation, IntelBroker turned more and more pissed off when the corporate did not acknowledge a safety incident and shared screenshots with BleepingComputer to show it had entry to a Cisco developer setting.

These screenshots and information, which we additionally shared with Cisco, confirmed that the risk actor had entry to most, if not all, of the information saved on this portal. This information included supply code, configuration information with database credentials, technical documentation, and SQL information.

It’s unclear what buyer information was saved on these servers and none was shared with us.

IntelBroker additional claimed to have had steady entry till immediately, when Cisco blocked all entry to the compromised jFrog developer setting and portal. The risk actor additionally stated that he misplaced entry to a Maven and Docker server associated to the DevHub portal however didn’t share any proof of such entry.

When requested if he had tried to blackmail Cisco into not releasing stolen information, IntelBroker stated he did not strive as a result of they most likely would not belief him to maintain his phrase.

“I would not belief a risk actor in the event that they requested me for cash to not leak my stuff, so that they should not both,” IntelBroker advised BleepingComputer.

Whereas Cisco continues to say that no system was breached, the whole lot we have seen signifies {that a} third-party growth was breached, permitting the risk actor to steal information.

BleepingComputer reached out to Cisco with additional questions on these claims, however a response was not instantly accessible.

Related Articles

Latest Articles