05-10-2024, 06:50 AM
News UK-Based Digital Signing Platform SigningHub Denies Cyberattack by IntelBroker
<p><img width="1000" height="550" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="SigningHub Data Leak" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp 1000w, https://thecyberexpress.com/wp-content/u...0x165.webp 300w, https://thecyberexpress.com/wp-content/u...8x422.webp 768w, https://thecyberexpress.com/wp-content/u...0x330.webp 600w, https://thecyberexpress.com/wp-content/u...50x83.webp 150w, https://thecyberexpress.com/wp-content/u...0x413.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>SigningHub has denied the allegations of the cyberattack orchestrated by the IntelBroker hacker. The <span style="font-weight: 400;">UK-based online document signing and digital signature creation service provider has shared a blog post, detailing the false claims made by the threat actor. </span>
The organization stated that "this claim has been found to be 100% false", and upon analysis of the file purported to be the source code of Ascertia SigningHub, the organization denoted that the file does not include any source code or executable related to SigningHub or any other Ascertia product.
<span style="font-weight: 400;">The SigningHub data leak, initially posted on the</span><span style="font-weight: 400;"> nuovo BreachForums, shared insights into the operation of the organization. </span><span style="font-weight: 400;">IntelBroker, a known entity in the hacker community, revealed the breach on May 8, 2024, shedding light on an incident that allegedly occurred in December 2023. </span>
<span style="font-weight: 400;">The leaked source code encompasses crucial elements of SigningHub's infrastructure, including API services, docker container files, certificates, libraries, and other sensitive <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3514">data</a>. </span>
<h3><span style="font-weight: 400;">Ascertia Denies Allegations of the SigningHub Data Leak</span></h3>
Following the SigningHub data leak claims, Ascertia responded to the claims via a blog post, stating the SigningHub data breach and source code leak to be false. Allegations arose on May 8th via Twitter/X, claiming unauthorized access to Ascertia's network in December 2023.
After thorough investigation, Ascertia confirmed no breach or access to SigningHub's source code. The file posted online purported to be SigningHub's source code was analyzed, revealing no related content.
The Ascertia IT team simultaneously began a thorough investigation of the Ascertia <a class="wpil_keyword_link" title="network security" href="https://thecyberexpress.com/what-is-network-security/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3606">network security</a> systems and logs. At this time, Ascertia can confirm that there is no unauthorised access from bad actors and has concluded that the claims of a data breach are also false", stated <a href="https://blog.ascertia.com/ascertia-signinghub-false-data-breach-claim" target="_blank" rel="nofollow noopener">Ascertia</a>.
Simultaneously, Ascertia's IT team examined network security systems and logs, confirming no unauthorized access. Ascertia emphasizes its dedication to information security, GDPR compliance, and robust security measures. Ongoing analysis of network access points and systems ensures product, staff, and client data security."
<h3>IntelBroker Claims SigningHub Data Leak</h3>
[caption id="attachment_67397" align="alignnone" width="1402"]<img class="wp-image-67397 size-full" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-1.webp" alt="SigningHub Data Leak" width="1402" height="793" /> Source: <a class="wpil_keyword_link" title="Dark Web" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3516">Dark Web</a>[/caption]
<span style="font-weight: 400;">The announcement of the SigningHub data breach paints a grim picture of the intrusion and its alleged impact. The post, titled "SigningHub - File Signing SRC Leaked, Download!", was shared by the threat actor while other users commended the <a class="wpil_keyword_link" title="hacker" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3517">hacker</a> for this intrusion, stating the SigningHub code leak was “another great hit”, “top release” and other words of praise. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to Ascertia to learn more about this SigningHub data leak. </span><span style="font-weight: 400;">However, at the time of writing this, no official statement or response has been shared apart from the blog post by the parent company Ascertia.</span>
<span style="font-weight: 400;">In an attempt to shed light on the operation associated with the hacker, <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> reached out to IntelBroker for insights into their motivations and methods. In a recent interview, IntelBroker shared details of their <a class="wpil_keyword_link" title="hacking" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3513">hacking</a> journey, affiliations, and previous exploits, highlighting the scale and sophistication of their operations.
</span>
<h3><span style="font-weight: 400;">The IntelBroker Modus Operandi and Recent Attacks</span></h3>
[embed]https://youtu.be/wXuurLlu25I?si=FQYqB3byG3-0lgyr[/embed]
<span style="font-weight: 400;">IntelBroker's track record includes a series of high-profile breaches targeting organizations across various sectors, ranging from aviation and technology to <a href="https://thecyberexpress.com/what-is-grc-governance-risk-compliance-a-beginners-guide/" target="_blank" rel="noopener" data-wpil-monitor-id="3535">government</a> agencies. </span>
<span style="font-weight: 400;">Notable breaches attributed to IntelBroker include infiltrations at the Los Angeles International Airport, Acuity, General Electric, DC Health Link, and others, each revealing the extent of <a class="wpil_keyword_link" title="vulnerabilities" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3515">vulnerabilities</a> in digital infrastructure.</span>
<span style="font-weight: 400;">The alleged breach at SigningHub adds another layer of complexity to the IntelBroker operations as the hacker has claimed multiple data breaches in 2024, highlighting the pressing issue of <a href="https://thecyberexpress.com/critical-security-flaw-javascript-library-vm2/" target="_blank" rel="noopener" data-wpil-monitor-id="3536">security</a>. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> will be closely monitoring the situation and we’ll update this post once we have more information on the SigningHub source code leak or any official confirmation from the organization.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The <a href="https://thecyberexpress.com/cisco-duo-data-breach-exposes-mfa-information/" target="_blank" rel="noopener" data-wpil-monitor-id="3537">information provided</a> is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/alleged-sign...data-leak/
<p><img width="1000" height="550" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="SigningHub Data Leak" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp 1000w, https://thecyberexpress.com/wp-content/u...0x165.webp 300w, https://thecyberexpress.com/wp-content/u...8x422.webp 768w, https://thecyberexpress.com/wp-content/u...0x330.webp 600w, https://thecyberexpress.com/wp-content/u...50x83.webp 150w, https://thecyberexpress.com/wp-content/u...0x413.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>SigningHub has denied the allegations of the cyberattack orchestrated by the IntelBroker hacker. The <span style="font-weight: 400;">UK-based online document signing and digital signature creation service provider has shared a blog post, detailing the false claims made by the threat actor. </span>
The organization stated that "this claim has been found to be 100% false", and upon analysis of the file purported to be the source code of Ascertia SigningHub, the organization denoted that the file does not include any source code or executable related to SigningHub or any other Ascertia product.
<span style="font-weight: 400;">The SigningHub data leak, initially posted on the</span><span style="font-weight: 400;"> nuovo BreachForums, shared insights into the operation of the organization. </span><span style="font-weight: 400;">IntelBroker, a known entity in the hacker community, revealed the breach on May 8, 2024, shedding light on an incident that allegedly occurred in December 2023. </span>
<span style="font-weight: 400;">The leaked source code encompasses crucial elements of SigningHub's infrastructure, including API services, docker container files, certificates, libraries, and other sensitive <a class="wpil_keyword_link" title="data" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3514">data</a>. </span>
<h3><span style="font-weight: 400;">Ascertia Denies Allegations of the SigningHub Data Leak</span></h3>
Following the SigningHub data leak claims, Ascertia responded to the claims via a blog post, stating the SigningHub data breach and source code leak to be false. Allegations arose on May 8th via Twitter/X, claiming unauthorized access to Ascertia's network in December 2023.
After thorough investigation, Ascertia confirmed no breach or access to SigningHub's source code. The file posted online purported to be SigningHub's source code was analyzed, revealing no related content.
The Ascertia IT team simultaneously began a thorough investigation of the Ascertia <a class="wpil_keyword_link" title="network security" href="https://thecyberexpress.com/what-is-network-security/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3606">network security</a> systems and logs. At this time, Ascertia can confirm that there is no unauthorised access from bad actors and has concluded that the claims of a data breach are also false", stated <a href="https://blog.ascertia.com/ascertia-signinghub-false-data-breach-claim" target="_blank" rel="nofollow noopener">Ascertia</a>.
Simultaneously, Ascertia's IT team examined network security systems and logs, confirming no unauthorized access. Ascertia emphasizes its dedication to information security, GDPR compliance, and robust security measures. Ongoing analysis of network access points and systems ensures product, staff, and client data security."
<h3>IntelBroker Claims SigningHub Data Leak</h3>
[caption id="attachment_67397" align="alignnone" width="1402"]<img class="wp-image-67397 size-full" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-1.webp" alt="SigningHub Data Leak" width="1402" height="793" /> Source: <a class="wpil_keyword_link" title="Dark Web" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3516">Dark Web</a>[/caption]
<span style="font-weight: 400;">The announcement of the SigningHub data breach paints a grim picture of the intrusion and its alleged impact. The post, titled "SigningHub - File Signing SRC Leaked, Download!", was shared by the threat actor while other users commended the <a class="wpil_keyword_link" title="hacker" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3517">hacker</a> for this intrusion, stating the SigningHub code leak was “another great hit”, “top release” and other words of praise. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to Ascertia to learn more about this SigningHub data leak. </span><span style="font-weight: 400;">However, at the time of writing this, no official statement or response has been shared apart from the blog post by the parent company Ascertia.</span>
<span style="font-weight: 400;">In an attempt to shed light on the operation associated with the hacker, <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> reached out to IntelBroker for insights into their motivations and methods. In a recent interview, IntelBroker shared details of their <a class="wpil_keyword_link" title="hacking" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3513">hacking</a> journey, affiliations, and previous exploits, highlighting the scale and sophistication of their operations.
</span>
<h3><span style="font-weight: 400;">The IntelBroker Modus Operandi and Recent Attacks</span></h3>
[embed]https://youtu.be/wXuurLlu25I?si=FQYqB3byG3-0lgyr[/embed]
<span style="font-weight: 400;">IntelBroker's track record includes a series of high-profile breaches targeting organizations across various sectors, ranging from aviation and technology to <a href="https://thecyberexpress.com/what-is-grc-governance-risk-compliance-a-beginners-guide/" target="_blank" rel="noopener" data-wpil-monitor-id="3535">government</a> agencies. </span>
<span style="font-weight: 400;">Notable breaches attributed to IntelBroker include infiltrations at the Los Angeles International Airport, Acuity, General Electric, DC Health Link, and others, each revealing the extent of <a class="wpil_keyword_link" title="vulnerabilities" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" data-wpil-keyword-link="linked" data-wpil-monitor-id="3515">vulnerabilities</a> in digital infrastructure.</span>
<span style="font-weight: 400;">The alleged breach at SigningHub adds another layer of complexity to the IntelBroker operations as the hacker has claimed multiple data breaches in 2024, highlighting the pressing issue of <a href="https://thecyberexpress.com/critical-security-flaw-javascript-library-vm2/" target="_blank" rel="noopener" data-wpil-monitor-id="3536">security</a>. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> will be closely monitoring the situation and we’ll update this post once we have more information on the SigningHub source code leak or any official confirmation from the organization.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The <a href="https://thecyberexpress.com/cisco-duo-data-breach-exposes-mfa-information/" target="_blank" rel="noopener" data-wpil-monitor-id="3537">information provided</a> is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/alleged-sign...data-leak/