Hackers Announce Second Breach at HP Enterprise and Aim to Sell Access

IntelBroker, a hacker notorious for previous cyber incidents, has once again targeted Hewlett-Packard Enterprise (HPE), claiming to have infiltrated the company’s internal systems. This latest assertion involves the theft of around 500 MB of data from HPE’s repositories; while this amount is smaller than typical breaches, it raises significant security concerns. The hacker has shared screenshots that suggest access to sensitive information, including credentials, internal configurations, and proprietary source code.

This marks the second attack on HPE by IntelBroker, following an earlier incident reported in January 2025. During that breach, the hacker publicly acknowledged compromising HPE’s infrastructure and extracting considerable amounts of sensitive data, details of which were shared on Breach Forums. The current breach highlights a troubling pattern and points to potential weaknesses in HPE’s cybersecurity defenses.

An analysis of the provided screenshots and data structure indicates the possible extraction of various sensitive items such as private keys, certificates, proprietary code for vital HPE products like iLO and Zerto, as well as access to internal Git repositories. Furthermore, the compromised data tree reveals access to exposed infrastructure configurations, including integrations with services like SignonService and Salesforce, internal DNS settings, and deployment pipelines for microservices, which significantly amplifies the potential impact of this incident.

IntelBroker’s strategy appears to be shifting in this recent breach. In the earlier event, they sought to sell the stolen data for Monero cryptocurrency to maintain anonymity. However, the hacker now suggests that they might release the data for free while opting to sell access to HPE’s infrastructure instead. This potential decision to monetize access rather than data highlights a new approach in the hacker’s activities.

The implications of this breach should prompt serious reflection among organizations on the necessity of reinforcing their cybersecurity measures. Regular audits of access controls and vigilant monitoring for suspicious behavior are critical to preventing such incidents. Should IntelBroker’s claims be validated, this breach could pose lasting consequences for HPE, affecting its operations and the trust placed in it by customers.

It’s important to distinguish between Hewlett-Packard Enterprise and HP Inc., which are two separate entities that emerged from the 2015 split of Hewlett-Packard. HPE focuses on providing enterprise-level IT solutions, including servers, storage, networking, and cloud computing, whereas HP Inc. is dedicated to personal computing and printing services for consumers and small businesses.

As the cybersecurity landscape continues to evolve, incidents like this reinforce the importance of a robust security posture. Business owners must remain vigilant in safeguarding their networks against unauthorized access, keeping in line with recognized frameworks such as the MITRE ATT&CK matrix. Tactics such as initial access, persistence, and privilege escalation may all be relevant to understanding this recent breach and its potential implications.

Hackread.com has reached out to HPE for official comment on this ongoing situation, and any response will be included as it becomes available. The urgency of the matter serves as a sobering reminder to proactively manage cybersecurity risks and maintain vigilance in the face of emerging threats.

Source