HPE Looking Into Potential Breach After Hacker’s Claims
Hewlett Packard Enterprise (HPE) is investigating claims by a hacker known as “IntelBroker,” who alleges having accessed and stolen sensitive data from the company’s systems.
The hacker posted on a cybercrime forum offering archives said to include HPE’s private GitHub repositories, source code for products like Zerto and iLO, Docker builds, and old user data related to product deliveries.
IntelBroker has a history of targeting major tech firms, and the forum post appeared on Jan. 16. It promises access to HPE’s developer environments and various credentials, though the precise scope of these assets remains unverified. Experts warn that leaked source code can reveal vulnerabilities in enterprise software, raising concerns among HPE’s business customers.
The company acted swiftly upon learning of these accusations.
“HPE became aware on January 16 of claims being made by a group called IntelBroker that it was in possession of information belonging to HPE. HPE immediately activated our cyber response protocols, disabled related credentials, and launched an investigation to evaluate the validity of the claims,” said spokesperson Adam R. Bauer. “There is no operational impact to our business at this time, nor evidence that customer information is involved.”
HPE has not confirmed whether the archives for sale are genuine, but it has taken steps to mitigate any potential intrusion.
Zerto, acquired by HPE in 2021, delivers key backup and ransomware protection features. Meanwhile, iLO is central to managing HPE’s ProLiant servers. If genuine, leaked code could pose a long-term security risk. However, the company says there is no sign of disruptions or compromised customer data.
As the investigation continues, HPE will likely remain on high alert. IntelBroker’s previous claims against other organizations sometimes proved exaggerated, but they still forced victims to reinforce security measures. HPE is now doing the same, rotating credentials and monitoring potentially affected systems to ensure ongoing protection for its users.
React to this headline: