Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Posted on August 18, 2025August 18, 2025 By CWS

A collection of vital vulnerabilities throughout a number of inside Intel web sites allowed for the whole exfiltration of the corporate’s world worker database and entry to confidential provider data.

The issues, stemming from fundamental safety oversights, uncovered the private particulars of over 270,000 Intel staff and employees.

The investigation from Eaton Works revealed that not less than 4 separate inside internet purposes contained extreme safety holes, together with client-side authentication bypasses, hardcoded credentials, and an absence of server-side validation.

These vulnerabilities offered 4 distinct pathways for an unauthorized consumer to obtain the complete worker database.

Some of the vital breaches concerned a web site for Intel India staff to order enterprise playing cards. The analysis found it was potential to bypass the company Microsoft Azure login immediate by making a easy modification to the positioning’s JavaScript.

As soon as previous the login, the researcher discovered an unauthenticated API that will situation a sound entry token. This token may then be used to question a “employee” API.

By eradicating the search filter from the API request, the system returned a virtually 1 GB JSON file containing the names, job roles, managers, telephone numbers, and mailbox addresses for Intel’s complete world workforce.

Hierarchy Homeowners

This sample of lax safety was repeated throughout different inside techniques. A “Product Hierarchy” administration web site contained hardcoded credentials for its backend providers.

The password, whereas encrypted, used a notoriously weak AES key—’1234567890123456’—making it trivial to decrypt. This offered a second technique to entry the identical worker database, Eaton Works mentioned.

Encryption

One other “Product Onboarding” web site, presumed for use for managing entries on Intel’s public ARK product database, contained a trove of hardcoded secrets and techniques, together with a number of API keys and even a GitHub private entry token.

The fourth main vulnerability was present in Intel’s Provider EHS IP Administration System (SEIMS), a portal for managing mental property with suppliers. The researcher bypassed the login by modifying the code that checked for a sound token.

From there, they gained administrative entry by manipulating API responses, permitting them to view confidential provider knowledge, together with particulars of non-disclosure agreements (NDAs).

Shockingly, the system’s backend APIs accepted a fabricated authorization token with the worth “Not Autorized”—a typo that highlighted an entire breakdown in server-side safety checks.

The researcher responsibly disclosed all findings to Intel starting on October 14, 2024. The corporate’s bug bounty program coverage excludes internet infrastructure from financial rewards, directing such experiences to a safety e mail inbox.

Whereas the researcher acquired solely an automatic reply and no direct communication, they confirmed that Intel remediated all of the reported vulnerabilities earlier than the usual 90-day disclosure interval ended.

E-mail response

Whereas no extremely delicate knowledge like social safety numbers or salaries had been uncovered, the breach of worker PII and confidential companion knowledge on such a large scale represents a major safety lapse for the know-how large.

Safely detonate suspicious information to uncover threats, enrich your investigations, and lower incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Confidential, Data, Employee, Exploited, Hack, Intel, View, Websites

Post navigation

Previous Post: Novel 5G Attack Bypasses Need for Malicious Base Station
Next Post: Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Related Posts

CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed Cyber Security News
Global Outage Disrupts Microsoft Exchange Online Access Global Outage Disrupts Microsoft Exchange Online Access Cyber Security News
Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Cyber Security News
Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands Elastic Cloud Enterprise Vulnerability Let Attackers Execute Malicious Commands Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark