05-09-2024, 08:05 AM
News UK-Based Digital Signing Platform SigningHub Faces Alleged Source Code Leak
<p><img width="1000" height="550" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="SigningHub Data Leak" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp 1000w, https://thecyberexpress.com/wp-content/u...0x165.webp 300w, https://thecyberexpress.com/wp-content/u...8x422.webp 768w, https://thecyberexpress.com/wp-content/u...0x330.webp 600w, https://thecyberexpress.com/wp-content/u...50x83.webp 150w, https://thecyberexpress.com/wp-content/u...0x413.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">IntelBroker has claimed the SigningHub data leak, impacting the UK-based online document signing and digital signature creation service provider. The breach, reportedly orchestrated by threat actor IntelBroker and disclosed on nuovo BreachForums, shares insights into the operation of the organization. </span>
<span style="font-weight: 400;">IntelBroker, a known entity in the hacker community, revealed the breach on May 8, 2024, shedding light on an incident that occurred in December 2023. The leaked source code encompasses crucial elements of SigningHub's infrastructure, including API services, docker container files, certificates, libraries, and other sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="3514">data</a>. </span>
<span style="font-weight: 400;">This breach has implications not only for SigningHub but also for its parent company, Ascertia Limited, headquartered in Surrey, United Kingdom.</span>
<h3><span style="font-weight: 400;">Decoding the SigningHub Data Leak Claims</span></h3>
[caption id="attachment_67397" align="alignnone" width="1402"]<img class="wp-image-67397 size-full" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-1.webp" alt="SigningHub Data Leak" width="1402" height="793" /> Source: <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" title="Dark Web" data-wpil-keyword-link="linked" data-wpil-monitor-id="3516">Dark Web</a>[/caption]
<span style="font-weight: 400;">The announcement of the SigningHub data breach paints a grim picture of the intrusion and its impact. The post, titled "SigningHub - File Signing SRC Leaked, Download!", was shared by the threat actor while other users commended the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" title="hacker" data-wpil-keyword-link="linked" data-wpil-monitor-id="3517">hacker</a> for this intrusion, stating the SigningHub code leak was “another great hit”, “top release” and other words of praise. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to Ascertia to learn more about this SigningHub data leak. However, at the time of writing this, no official statement or response has been shared. The absence of a response leaves the claims surrounding the SigningHub <a href="https://en.wikipedia.org/wiki/Source_code" target="_blank" rel="nofollow noopener">source code</a> leak unverified, exacerbating concerns among users and stakeholders.</span>
<span style="font-weight: 400;">In an attempt to shed light on the operation associated with the hacker, <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> reached out to IntelBroker for insights into their motivations and methods. In a recent interview, IntelBroker shared details of their <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" title="hacking" data-wpil-keyword-link="linked" data-wpil-monitor-id="3513">hacking</a> journey, affiliations, and previous exploits, highlighting the scale and sophistication of their operations.
</span>
<h3><span style="font-weight: 400;">The IntelBroker Modus Operandi and Recent Attacks</span></h3>
[embed]https://youtu.be/wXuurLlu25I?si=FQYqB3byG3-0lgyr[/embed]
<span style="font-weight: 400;">IntelBroker's track record includes a series of high-profile breaches targeting organizations across various sectors, ranging from aviation and technology to government agencies. </span>
<span style="font-weight: 400;">Notable breaches attributed to IntelBroker include infiltrations at the Los Angeles International Airport, Acuity, General Electric, DC Health Link, and others, each revealing the extent of <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" title="vulnerabilities" data-wpil-keyword-link="linked" data-wpil-monitor-id="3515">vulnerabilities</a> in digital infrastructure.</span>
<span style="font-weight: 400;">The alleged breach at SigningHub adds another layer of complexity to the IntelBroker operations as the hacker has claimed multiple data breaches in 2024, highlighting the pressing issue of security. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> will be closely monitoring the situation and we’ll update this post once we have more information on the SigningHub source code leak or any official confirmation from the organization.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/alleged-sign...data-leak/
<p><img width="1000" height="550" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="SigningHub Data Leak" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-e1715234983617.webp 1000w, https://thecyberexpress.com/wp-content/u...0x165.webp 300w, https://thecyberexpress.com/wp-content/u...8x422.webp 768w, https://thecyberexpress.com/wp-content/u...0x330.webp 600w, https://thecyberexpress.com/wp-content/u...50x83.webp 150w, https://thecyberexpress.com/wp-content/u...0x413.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">IntelBroker has claimed the SigningHub data leak, impacting the UK-based online document signing and digital signature creation service provider. The breach, reportedly orchestrated by threat actor IntelBroker and disclosed on nuovo BreachForums, shares insights into the operation of the organization. </span>
<span style="font-weight: 400;">IntelBroker, a known entity in the hacker community, revealed the breach on May 8, 2024, shedding light on an incident that occurred in December 2023. The leaked source code encompasses crucial elements of SigningHub's infrastructure, including API services, docker container files, certificates, libraries, and other sensitive <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="3514">data</a>. </span>
<span style="font-weight: 400;">This breach has implications not only for SigningHub but also for its parent company, Ascertia Limited, headquartered in Surrey, United Kingdom.</span>
<h3><span style="font-weight: 400;">Decoding the SigningHub Data Leak Claims</span></h3>
[caption id="attachment_67397" align="alignnone" width="1402"]<img class="wp-image-67397 size-full" src="https://thecyberexpress.com/wp-content/uploads/SigningHub-Data-Leak-1.webp" alt="SigningHub Data Leak" width="1402" height="793" /> Source: <a class="wpil_keyword_link" href="https://thecyberexpress.com/firewall-daily/dark-web-news/" target="_blank" rel="noopener" title="Dark Web" data-wpil-keyword-link="linked" data-wpil-monitor-id="3516">Dark Web</a>[/caption]
<span style="font-weight: 400;">The announcement of the SigningHub data breach paints a grim picture of the intrusion and its impact. The post, titled "SigningHub - File Signing SRC Leaked, Download!", was shared by the threat actor while other users commended the <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-hacker/" target="_blank" rel="noopener" title="hacker" data-wpil-keyword-link="linked" data-wpil-monitor-id="3517">hacker</a> for this intrusion, stating the SigningHub code leak was “another great hit”, “top release” and other words of praise. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to Ascertia to learn more about this SigningHub data leak. However, at the time of writing this, no official statement or response has been shared. The absence of a response leaves the claims surrounding the SigningHub <a href="https://en.wikipedia.org/wiki/Source_code" target="_blank" rel="nofollow noopener">source code</a> leak unverified, exacerbating concerns among users and stakeholders.</span>
<span style="font-weight: 400;">In an attempt to shed light on the operation associated with the hacker, <a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> reached out to IntelBroker for insights into their motivations and methods. In a recent interview, IntelBroker shared details of their <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-hacking/" target="_blank" rel="noopener" title="hacking" data-wpil-keyword-link="linked" data-wpil-monitor-id="3513">hacking</a> journey, affiliations, and previous exploits, highlighting the scale and sophistication of their operations.
</span>
<h3><span style="font-weight: 400;">The IntelBroker Modus Operandi and Recent Attacks</span></h3>
[embed]https://youtu.be/wXuurLlu25I?si=FQYqB3byG3-0lgyr[/embed]
<span style="font-weight: 400;">IntelBroker's track record includes a series of high-profile breaches targeting organizations across various sectors, ranging from aviation and technology to government agencies. </span>
<span style="font-weight: 400;">Notable breaches attributed to IntelBroker include infiltrations at the Los Angeles International Airport, Acuity, General Electric, DC Health Link, and others, each revealing the extent of <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" title="vulnerabilities" data-wpil-keyword-link="linked" data-wpil-monitor-id="3515">vulnerabilities</a> in digital infrastructure.</span>
<span style="font-weight: 400;">The alleged breach at SigningHub adds another layer of complexity to the IntelBroker operations as the hacker has claimed multiple data breaches in 2024, highlighting the pressing issue of security. </span>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> will be closely monitoring the situation and we’ll update this post once we have more information on the SigningHub source code leak or any official confirmation from the organization.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/alleged-sign...data-leak/