GE “Development and Software Pipelines” allegedly up for sale on Dark Web

GE “Development and Software Pipelines” allegedly up for sale on Dark Web
<span class="bsf-rt-reading-time"><span class="bsf-rt-display-label" prefix="Reading Time"></span> <span class="bsf-rt-display-time" reading_time="1"></span> <span class="bsf-rt-display-postfix" postfix="mins"></span></span><!-- .bsf-rt-reading-time -->

In November, a user going by the name "IntelBroker" posted online offering access to "development and software pipelines" from General Electric for $500. After a short period, they increased the stakes by including network access in the offer, posting that "I previously listed the access to General Electrics, however, no serious buyers have actually responded to me or followed up. I am now selling the entire thing here separately, including access (SSH, SVN etc)."

 

Among the files advertised by IntelBroker, they claimed to possess DARPA-related military information and documents. Screenshots shared on the forum purportedly showed stolen data, including a database from GE Aviation, which appeared to contain details on military projects. The seriousness of this claim cannot be understated, as it suggests a potential compromise of sensitive and classified information related to defense projects.

BleepingComputer.com, a cybersecurity news source, reported on the incident, highlighting IntelBroker's actions and the potential severity of the breach. While the breach has not been officially confirmed, they did speak with General Electric, which is aware of the claims.

IntelBroker is not a newcomer to the world of hacking; they gained notoriety for previously infiltrating DC Health Link, a healthcare marketplace widely used by federal staffers. This track record raises concerns about the hacker's capabilities and motivations, especially considering their previous involvement in compromising a system with ties to the federal government.

This incident is a stark reminder of the ever-present threat of cyber attacks on even the most prominent and secure organizations. As the story unfolds, it will undoubtedly prompt discussions about the need for robust cybersecurity measures in an increasingly interconnected digital landscape.