Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Allegedly Claim Access to Nokia’s Internal Network

Posted on July 30, 2025July 30, 2025 By CWS

A menace actor, Tsar0Byte, allegedly claimed to have breached the corporate’s inner community via a susceptible third-party hyperlink, exposing delicate information belonging to greater than 94,500 workers.

The alleged breach, reported on darkish net boards together with DarkForums, represents some of the in depth company information exposures affecting Nokia lately. In response to the menace actor’s claims, the compromised information features a complete inner listing containing:

Full worker names and make contact with particulars

Company e mail addresses and cellphone numbers

Division info and job titles

LinkedIn profile traces and inner references

Inside paperwork and partner-side logs

Worker identification numbers and company hierarchies

The breach seems to have occurred via the exploitation of a third-party contractor’s methods that had direct entry to Nokia’s inner infrastructure for instrument improvement functions. This methodology of assault via provide chain vulnerabilities has develop into more and more widespread amongst cybercriminals focusing on main companies.

Alleged Breach Declare

Allegedly Declare to Nokia Inside Techniques

Cybersecurity researchers analyzing the incident recommend that Tsar0Byte gained preliminary entry via poorly secured contractor methods, doubtlessly exploiting default credentials or misconfigured entry controls.

The assault methodology mirrors earlier incidents the place menace actors have efficiently penetrated company networks by focusing on much less safe third-party distributors who preserve privileged entry to main methods.

Alleged Breach Declare

These technical property signify a major safety threat, as they may present attackers with the means to take care of persistent entry or launch further assaults in opposition to Nokia’s infrastructure.

This incident follows a sample of high-profile information breaches affecting main expertise firms in 2024 and 2025. Nokia has beforehand confronted cybersecurity challenges, together with a separate breach in November 2024 the place the menace actor IntelBroker claimed to have stolen supply code and credentials from a third-party contractor.

Nokia’s cybersecurity workforce has acknowledged consciousness of the claims and said they’re conducting a radical investigation. The corporate emphasised that their preliminary findings haven’t recognized proof of direct compromise to their main methods, although they proceed to observe the state of affairs intently.

Safety specialists observe that such incidents underscore the necessity for enhanced vendor safety assessments, common audits of third-party entry privileges, and implementation of zero-trust safety fashions that assume no inherent belief for any system or person.

Whereas Nokia has not confirmed that buyer information was immediately affected, the publicity of inner worker info poses dangers for focused phishing campaigns and social engineering assaults in opposition to firm personnel.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Access, Actors, Allegedly, Claim, Internal, Network, Nokias, Threat

Post navigation

Previous Post: FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
Next Post: Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Related Posts

Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News
Behavioral Monitoring for Real-Time Endpoint Threat Detection Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Infamous BreachForums Is Back Online With All Accounts and Posts Restored Cyber Security News
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data 
  • Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University
  • Report Links Chinese Companies to Tools Used by State-Sponsored Hackers
  • 20 Best Kubernetes Monitoring Tools in 2025
  • UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data 
  • Microsoft SharePoint Server 0-Day Hack Hits African Treasury, Companies, and University
  • Report Links Chinese Companies to Tools Used by State-Sponsored Hackers
  • 20 Best Kubernetes Monitoring Tools in 2025
  • UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News