Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Posted on August 18, 2025August 18, 2025 By CWS

A collection of vital vulnerabilities throughout a number of inside Intel web sites allowed for the whole exfiltration of the corporate’s world worker database and entry to confidential provider data.

The issues, stemming from fundamental safety oversights, uncovered the private particulars of over 270,000 Intel staff and employees.

The investigation from Eaton Works revealed that not less than 4 separate inside internet purposes contained extreme safety holes, together with client-side authentication bypasses, hardcoded credentials, and an absence of server-side validation.

These vulnerabilities offered 4 distinct pathways for an unauthorized consumer to obtain the complete worker database.

Some of the vital breaches concerned a web site for Intel India staff to order enterprise playing cards. The analysis found it was potential to bypass the company Microsoft Azure login immediate by making a easy modification to the positioning’s JavaScript.

As soon as previous the login, the researcher discovered an unauthenticated API that will situation a sound entry token. This token may then be used to question a “employee” API.

By eradicating the search filter from the API request, the system returned a virtually 1 GB JSON file containing the names, job roles, managers, telephone numbers, and mailbox addresses for Intel’s complete world workforce.

Hierarchy Homeowners

This sample of lax safety was repeated throughout different inside techniques. A “Product Hierarchy” administration web site contained hardcoded credentials for its backend providers.

The password, whereas encrypted, used a notoriously weak AES key—’1234567890123456’—making it trivial to decrypt. This offered a second technique to entry the identical worker database, Eaton Works mentioned.

Encryption

One other “Product Onboarding” web site, presumed for use for managing entries on Intel’s public ARK product database, contained a trove of hardcoded secrets and techniques, together with a number of API keys and even a GitHub private entry token.

The fourth main vulnerability was present in Intel’s Provider EHS IP Administration System (SEIMS), a portal for managing mental property with suppliers. The researcher bypassed the login by modifying the code that checked for a sound token.

From there, they gained administrative entry by manipulating API responses, permitting them to view confidential provider knowledge, together with particulars of non-disclosure agreements (NDAs).

Shockingly, the system’s backend APIs accepted a fabricated authorization token with the worth “Not Autorized”—a typo that highlighted an entire breakdown in server-side safety checks.

The researcher responsibly disclosed all findings to Intel starting on October 14, 2024. The corporate’s bug bounty program coverage excludes internet infrastructure from financial rewards, directing such experiences to a safety e mail inbox.

Whereas the researcher acquired solely an automatic reply and no direct communication, they confirmed that Intel remediated all of the reported vulnerabilities earlier than the usual 90-day disclosure interval ended.

E-mail response

Whereas no extremely delicate knowledge like social safety numbers or salaries had been uncovered, the breach of worker PII and confidential companion knowledge on such a large scale represents a major safety lapse for the know-how large.

Safely detonate suspicious information to uncover threats, enrich your investigations, and lower incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Confidential, Data, Employee, Exploited, Hack, Intel, View, Websites

Post navigation

Previous Post: Novel 5G Attack Bypasses Need for Malicious Base Station
Next Post: Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Related Posts

Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Cyber Security News
Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks Cyber Security News
New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets New Research Uncovers 28 Unique IP Addresses and 85 Domains Hosting Carding Markets Cyber Security News
Chrome Zero-Day Vulnerabilities Exploited in 2025 Chrome Zero-Day Vulnerabilities Exploited in 2025 Cyber Security News
FreePBX Servers Hacked in 0-day Attack FreePBX Servers Hacked in 0-day Attack Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News