Nokia Investigates Data Breach; No Critical Information Compromised

November 18, 2024

Recent events have thrown Nokia into the spotlight after reports surfaced that hackers had breached the tech giant’s security through vulnerabilities found in a third-party company’s systems. The initial claims were alarming, suggesting that sensitive data, including SSH keys, source code, and credentials, had been taken by a hacker group known as Intel Broker and put up for sale on BreachForums for $20,000. This revelation led to heightened surveillance and a concentrated effort by Nokia to determine whether any of their critical data had indeed been compromised.

Investigation and Preliminary Findings

Nokia’s response to the situation was immediate and thorough, as the company launched a brisk investigation into the alleged breach. Preliminary findings from this investigation have so far brought relief, revealing that there is no evidence that essential data such as source code, corporate software, or encryption keys were stolen. Nor have there been any signs that suggest any of Nokia’s internal systems were breached. Instead, it appears that the intrusion was due to a security incident involving a third-party customized software application. A notable vulnerability identified was with a SonarQube server, where a default password was used, allowing unauthorized access.

Throughout the investigation, Nokia has consistently assured that no customer data was involved in the breach. This statement aligns with the data listed by the hacker group, which included SSH keys, source code, RSA keys, Bitbucket logins, SMTP accounts, webhooks, and hardcoded credentials as the stolen items. It is crucial to highlight that despite the presence of these components, they do not include any proprietary customer information, alleviating some of the initial concerns following the breach announcement.

Ensuring Future Security

Nokia’s security team has since been working around the clock to assess the extent of the breach and implement measures to strengthen their defenses. The tech giant is collaborating with cybersecurity experts to trace the origins of the attack and close any security gaps that may exist. This incident underscores the growing threat of cyberattacks and the importance of robust security protocols to protect sensitive data from malicious actors.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later