Dell investigates knowledge breach claims after hacker leaks worker information

Dell investigates knowledge breach claims after hacker leaks worker information

Dell has confirmed to BleepingComputer that they’re investigating latest claims that it suffered a knowledge breach after a risk actor leaked the info for over 10,000 staff.

The allegations have been printed yesterday by a risk actor named “grep,” who alleges that the computing vendor suffered a “minor knowledge breach” in September 2024, exposing inside worker and companion info.

In a publish to a hacking discussion board, the risk actor says the stolen knowledge contains staff’ distinctive identifiers, full names of staff for Dell and companions, standing of staff (energetic or not), and an inside identification string.

Alleged Dell data leaked on a hacking forum
Alleged Dell knowledge leaked on a hacking discussion board
Supply: BleepingComputer

Although solely a small pattern of the info was shared without spending a dime, a hyperlink to all the database could be revealed by spending 1 BreachForums credit score, valued at roughly $0.30.

Responding to a request for a touch upon the risk actor’s publish, the pc big advised BleepingComputer that they’re investigating the claims.

“We’re conscious of the claims and our safety group is at the moment investigating,” Dell advised BleepingComputer.

It’s price noting that the identical consumer, grep, claimed one other high-profile knowledge breach on September 9, 2024, when he posted knowledge allegedly stolen from the French IT big Capgemini.

The risk actor alleged to carry 20 GB of information, together with supply code, credentials, non-public keys, API keys, worker knowledge, T-Cell digital machine logs, paperwork, and extra, which was leaked without spending a dime.

BleepingComputer contacted Capgemini on the time to ask about grep’s claims however didn’t obtain a reply.

Earlier this yr, Dell suffered a knowledge breach after an organization API was abused to steal 49 million buyer data

Leave a Reply

Your email address will not be published. Required fields are marked *