Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Allegedly Claim Access to Nokia’s Internal Network

Posted on July 30, 2025July 30, 2025 By CWS

A menace actor, Tsar0Byte, allegedly claimed to have breached the corporate’s inner community via a susceptible third-party hyperlink, exposing delicate information belonging to greater than 94,500 workers.

The alleged breach, reported on darkish net boards together with DarkForums, represents some of the in depth company information exposures affecting Nokia lately. In response to the menace actor’s claims, the compromised information features a complete inner listing containing:

Full worker names and make contact with particulars

Company e mail addresses and cellphone numbers

Division info and job titles

LinkedIn profile traces and inner references

Inside paperwork and partner-side logs

Worker identification numbers and company hierarchies

The breach seems to have occurred via the exploitation of a third-party contractor’s methods that had direct entry to Nokia’s inner infrastructure for instrument improvement functions. This methodology of assault via provide chain vulnerabilities has develop into more and more widespread amongst cybercriminals focusing on main companies.

Alleged Breach Declare

Allegedly Declare to Nokia Inside Techniques

Cybersecurity researchers analyzing the incident recommend that Tsar0Byte gained preliminary entry via poorly secured contractor methods, doubtlessly exploiting default credentials or misconfigured entry controls.

The assault methodology mirrors earlier incidents the place menace actors have efficiently penetrated company networks by focusing on much less safe third-party distributors who preserve privileged entry to main methods.

Alleged Breach Declare

These technical property signify a major safety threat, as they may present attackers with the means to take care of persistent entry or launch further assaults in opposition to Nokia’s infrastructure.

This incident follows a sample of high-profile information breaches affecting main expertise firms in 2024 and 2025. Nokia has beforehand confronted cybersecurity challenges, together with a separate breach in November 2024 the place the menace actor IntelBroker claimed to have stolen supply code and credentials from a third-party contractor.

Nokia’s cybersecurity workforce has acknowledged consciousness of the claims and said they’re conducting a radical investigation. The corporate emphasised that their preliminary findings haven’t recognized proof of direct compromise to their main methods, although they proceed to observe the state of affairs intently.

Safety specialists observe that such incidents underscore the necessity for enhanced vendor safety assessments, common audits of third-party entry privileges, and implementation of zero-trust safety fashions that assume no inherent belief for any system or person.

Whereas Nokia has not confirmed that buyer information was immediately affected, the publicity of inner worker info poses dangers for focused phishing campaigns and social engineering assaults in opposition to firm personnel.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Access, Actors, Allegedly, Claim, Internal, Network, Nokias, Threat

Post navigation

Previous Post: FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
Next Post: Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Related Posts

New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News