Nokia investigates breach after hacker claims to steal source code

pSonicWall Firewall configs stolen for all cloud backup customersppNew FileFix attack uses cache smuggling to evade security softwareppHackers claim Discord breach exposed data of 55 million usersppGoogles new AI bug bounty program pays up to 30000 for flawsppHarvard investigating breach linked to Oracle zeroday exploitppThe 380 refurbished Surface Laptop 3 with i7 performance and 16GB RAMppFake Inflation Refund texts target New Yorkers in new scamppGet your first year of Sams Club membership for 15 MSRP 50ppHow to access the Dark Web using the Tor BrowserppHow to enable Kernelmode Hardwareenforced Stack Protection in Windows 11ppHow to use the Windows Registry EditorppHow to backup and restore the Windows RegistryppHow to start Windows in Safe ModeppHow to remove a Trojan Virus Worm or other MalwareppHow to show hidden files in Windows 7ppHow to see hidden files in WindowsppRemove the Theonlinesearchcom Search RedirectppRemove the Smartwebfindercom Search RedirectppHow to remove the PBlock adware browser extensionppRemove the Toksearchesxyz Search RedirectppRemove Security Tool and SecurityTool Uninstall GuideppHow to Remove WinFixer Virtumonde Msevents TrojanvundoppHow to remove Antivirus 2009 Uninstall InstructionsppHow to remove Google Redirects or the TDSS TDL3 or Alureon rootkit using TDSSKillerppLocky Ransomware Information Help Guide and FAQppCryptoLocker Ransomware Information Guide and FAQppCryptorBit and HowDecrypt Information Guide and FAQppCryptoDefense and HowDecrypt Ransomware Information Guide and FAQppQualys BrowserCheckppSTOPDecrypterppAuroraDecrypterppFilesLockerDecrypterppAdwCleanerppComboFixppRKillppJunkware Removal ToolppeLearningppIT Certification CoursesppGear GadgetsppSecurityppBest VPNsppHow to change IP addressppAccess the dark web safelyppBest VPN for YouTubeppppNokia is investigating whether a thirdparty vendor was breached after a hacker claimed to be selling the companys stolen source codeppNokia is aware of reports that an unauthorized actor has alleged to have gained access to certain thirdparty contractor data and possibly data of Nokia the company told BleepingComputerppNokia takes this allegation seriously and we are investigating To date our investigation has found no evidence that any of our systems or data being impacted We continue to closely monitor the situationppThis statement comes after a threat actor known as IntelBroker claimed to be selling Nokia source code that was stolen after they breached a thirdparty vendors serverppToday I am selling a large collection of Nokia source code which we got from a 3rd party contractor that directly worked with Nokia to help aid their development of some internal toolsppIntelBroker states that the stolen data contains SSH keys source code RSA keys BitBucket logins SMTP accounts webhooks and hardcoded credentialsppThe threat actor told BleepingComputer that they gained access to the thirdparty vendors SonarQube server using default credentials allowing them to download customers Python projects including those belonging to NokiappBleepingComputer shared a file tree of the allegedly stolen data with Nokia asking if the data belonged to them but has not received a response at this timeppIntelBroker gained notoriety after breaching DC Health Link an organization that administers the health care plans of US House members their staff and their familiesppOther cybersecurity incidents linked to IntelBroker are the breaches of Hewlett Packard Enterprise HPE and the Weee grocery serviceppMore recently the threat actor leaked data from numerous companies including TMobile AMD and Apple which was stolen from a thirdparty SaaS vendorppJoin the Breach and Attack Simulation Summit and experience the future of security validation Hear from top experts and see how AIpowered BAS is transforming breach and attack simulationppDont miss the event that will shape the future of your security strategyppFrom Lab to Leadership How VMware Certification Transformed My CareerppCybersecurity For Dummies 3rd Edition eBook FREE for a Limited TimeppFrom infostealer to full RAT dissecting the PureRAT attack chainppGet lifetime access to 90 cybersecurity training courses for 53ppNew FileFix attack uses cache smuggling to evade security softwareppNot a member yet Register NowppFBI takes down BreachForums portal used for Salesforce extortionppWindows 11 23H2 Home and Pro reach end of support in 30 daysppApple now offers 2 million for zeroclick RCE vulnerabilitiesppThe role of Artificial Intelligence in todays cybersecurity landscapeppMake the leapget certified with VMUG Advantage Start your career journey todayppJoin Huntress to discuss all things tradecraft in a monthly meeting of the technical mindsppRedefine security validation with Picus AIdriven Breach and Attack SimulationppSee how Material secures Gmail Drive with EDRstyle detection and rapid responseppTerms of Use Privacy Policy Ethics Statement Affiliate DisclosureppCopyright 2003 2025 Bleeping Computer LLC All Rights ReservedppNot a member yet Register NowppRead our posting guidelinese to learn what content is prohibitedp