Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Posted on August 18, 2025August 18, 2025 By CWS

A collection of vital vulnerabilities throughout a number of inside Intel web sites allowed for the whole exfiltration of the corporate’s world worker database and entry to confidential provider data.

The issues, stemming from fundamental safety oversights, uncovered the private particulars of over 270,000 Intel staff and employees.

The investigation from Eaton Works revealed that not less than 4 separate inside internet purposes contained extreme safety holes, together with client-side authentication bypasses, hardcoded credentials, and an absence of server-side validation.

These vulnerabilities offered 4 distinct pathways for an unauthorized consumer to obtain the complete worker database.

Some of the vital breaches concerned a web site for Intel India staff to order enterprise playing cards. The analysis found it was potential to bypass the company Microsoft Azure login immediate by making a easy modification to the positioning’s JavaScript.

As soon as previous the login, the researcher discovered an unauthenticated API that will situation a sound entry token. This token may then be used to question a “employee” API.

By eradicating the search filter from the API request, the system returned a virtually 1 GB JSON file containing the names, job roles, managers, telephone numbers, and mailbox addresses for Intel’s complete world workforce.

Hierarchy Homeowners

This sample of lax safety was repeated throughout different inside techniques. A “Product Hierarchy” administration web site contained hardcoded credentials for its backend providers.

The password, whereas encrypted, used a notoriously weak AES key—’1234567890123456’—making it trivial to decrypt. This offered a second technique to entry the identical worker database, Eaton Works mentioned.

Encryption

One other “Product Onboarding” web site, presumed for use for managing entries on Intel’s public ARK product database, contained a trove of hardcoded secrets and techniques, together with a number of API keys and even a GitHub private entry token.

The fourth main vulnerability was present in Intel’s Provider EHS IP Administration System (SEIMS), a portal for managing mental property with suppliers. The researcher bypassed the login by modifying the code that checked for a sound token.

From there, they gained administrative entry by manipulating API responses, permitting them to view confidential provider knowledge, together with particulars of non-disclosure agreements (NDAs).

Shockingly, the system’s backend APIs accepted a fabricated authorization token with the worth “Not Autorized”—a typo that highlighted an entire breakdown in server-side safety checks.

The researcher responsibly disclosed all findings to Intel starting on October 14, 2024. The corporate’s bug bounty program coverage excludes internet infrastructure from financial rewards, directing such experiences to a safety e mail inbox.

Whereas the researcher acquired solely an automatic reply and no direct communication, they confirmed that Intel remediated all of the reported vulnerabilities earlier than the usual 90-day disclosure interval ended.

E-mail response

Whereas no extremely delicate knowledge like social safety numbers or salaries had been uncovered, the breach of worker PII and confidential companion knowledge on such a large scale represents a major safety lapse for the know-how large.

Safely detonate suspicious information to uncover threats, enrich your investigations, and lower incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Confidential, Data, Employee, Exploited, Hack, Intel, View, Websites

Post navigation

Previous Post: Novel 5G Attack Bypasses Need for Malicious Base Station
Next Post: Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Related Posts

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers Cyber Security News
Threat Actors Using CrossC2 Tool to Expand Cobalt Strike to Operate on Linux and macOS Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News