Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Allegedly Claim Access to Nokia’s Internal Network

Posted on July 30, 2025July 30, 2025 By CWS

A menace actor, Tsar0Byte, allegedly claimed to have breached the corporate’s inner community via a susceptible third-party hyperlink, exposing delicate information belonging to greater than 94,500 workers.

The alleged breach, reported on darkish net boards together with DarkForums, represents some of the in depth company information exposures affecting Nokia lately. In response to the menace actor’s claims, the compromised information features a complete inner listing containing:

Full worker names and make contact with particulars

Company e mail addresses and cellphone numbers

Division info and job titles

LinkedIn profile traces and inner references

Inside paperwork and partner-side logs

Worker identification numbers and company hierarchies

The breach seems to have occurred via the exploitation of a third-party contractor’s methods that had direct entry to Nokia’s inner infrastructure for instrument improvement functions. This methodology of assault via provide chain vulnerabilities has develop into more and more widespread amongst cybercriminals focusing on main companies.

Alleged Breach Declare

Allegedly Declare to Nokia Inside Techniques

Cybersecurity researchers analyzing the incident recommend that Tsar0Byte gained preliminary entry via poorly secured contractor methods, doubtlessly exploiting default credentials or misconfigured entry controls.

The assault methodology mirrors earlier incidents the place menace actors have efficiently penetrated company networks by focusing on much less safe third-party distributors who preserve privileged entry to main methods.

Alleged Breach Declare

These technical property signify a major safety threat, as they may present attackers with the means to take care of persistent entry or launch further assaults in opposition to Nokia’s infrastructure.

This incident follows a sample of high-profile information breaches affecting main expertise firms in 2024 and 2025. Nokia has beforehand confronted cybersecurity challenges, together with a separate breach in November 2024 the place the menace actor IntelBroker claimed to have stolen supply code and credentials from a third-party contractor.

Nokia’s cybersecurity workforce has acknowledged consciousness of the claims and said they’re conducting a radical investigation. The corporate emphasised that their preliminary findings haven’t recognized proof of direct compromise to their main methods, although they proceed to observe the state of affairs intently.

Safety specialists observe that such incidents underscore the necessity for enhanced vendor safety assessments, common audits of third-party entry privileges, and implementation of zero-trust safety fashions that assume no inherent belief for any system or person.

Whereas Nokia has not confirmed that buyer information was immediately affected, the publicity of inner worker info poses dangers for focused phishing campaigns and social engineering assaults in opposition to firm personnel.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Access, Actors, Allegedly, Claim, Internal, Network, Nokias, Threat

Post navigation

Previous Post: FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
Next Post: Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Related Posts

Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks Cyber Security News
Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News
Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 689,000 Affected by Insider Breach at FinWise Bank
  • Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware
  • Silent Push Raises $10 Million for Threat Intelligence Platform
  • Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working
  • Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 689,000 Affected by Insider Breach at FinWise Bank
  • Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware
  • Silent Push Raises $10 Million for Threat Intelligence Platform
  • Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working
  • Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News