Cyber Security News

Threat Actor IntelBroker Claims Leak of Nokia’s Source Code

The threat actor known as IntelBroker, in collaboration with EnergyWeaponUser, has claimed responsibility for a significant data breach involving Nokia’s proprietary source code.

The news, which has sent ripples through the tech industry, was shared on social media, highlighting the potential consequences for Nokia and its stakeholders. 

The breach reportedly involves a substantial collection of Nokia’s source code, allegedly obtained through a third-party contractor associated with Nokia’s internal tool development.

Leak of Nokia’s Source Code

The compromised data includes sensitive information such as SSH keys, RSA keys, Bitbucket credentials, SMTP accounts, webhooks, and hardcoded credentials. A file tree has been provided as evidence to substantiate these claims.

Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs

HackManac announced the extent of the data allegedly exfiltrated in a post on X.

The threat actors claim to be selling this data, raising concerns about the potential misuse of Nokia’s intellectual property and the broader implications for cybersecurity within the telecommunications industry. 

Industry experts have expressed alarm over the breach, noting that the exposure of such critical information could lead to significant security vulnerabilities for Nokia and its partners and customers.

The availability of SSH and RSA keys, in particular, poses a serious threat, as these could potentially be used to gain unauthorized access to secure systems. 

Nokia has yet to issue an official statement regarding the breach, but cybersecurity analysts urge companies to review their security protocols, especially those related to third-party contractors.

The incident underscores the importance of implementing robust security measures and regularly auditing access controls to safeguard sensitive data. 

As investigations continue, the tech community watches closely to see how Nokia will respond.

This incident highlights the evolving landscape of cybercrime and the sophisticated tactics employed by threat actors to exploit vulnerabilities in corporate networks.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

8 hours ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

12 hours ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

12 hours ago

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…

12 hours ago

Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials

A surge in phishing text messages claiming unpaid tolls has been linked to a massive…

12 hours ago

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of unauthorized…

12 hours ago