Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Home/Breaches/HPE Data Breach: Russian Cyberattack on Office 3 Alerts
Breaches

HPE Data Breach: Russian Cyberattack on Office 3 Alerts

HPE Data Breach: Russian Office 3 Alerts So, Hewlett Packard Enterprise (HPE) just announced they’ve had a pretty big data breach. It hit their Office 365 email environment, which is a big...

Sarah simpson
Sarah simpson
January 2, 2026 2 Min Read
20 0

HPE Data Breach: Russian Office 3 Alerts

So, Hewlett Packard Enterprise (HPE) just announced they’ve had a pretty big data breach. It hit their Office 365 email environment, which is a big deal. And guess who’s behind it? None other than Midnight Blizzard, that notorious Russian state-sponsored hacking group you might also know as Cozy Bear or APT29.

The breach, which began in May 2023, was confirmed by HPE in December 2023 and has since been contained.

Details of the Breach

The attack targeted several email accounts within HPE’s cybersecurity, marketing, and business teams. Using a compromised account, the hackers gained unauthorized access to email mailboxes and exfiltrated sensitive data.

Information stolen includes Social Security numbers, driver’s license details, and credit card numbers belonging to employees. Additionally, some files from HPE’s SharePoint server were accessed during the same timeframe.

HPE’s forensic investigation revealed that the breach was part of a larger campaign by Midnight Blizzard, a group linked to Russia’s Foreign Intelligence Service (SVR).

This group has been implicated in other high-profile cyberattacks, including the SolarWinds espionage campaign and a recent breach of Microsoft’s corporate network.

Response and Notifications

HPE began notifying affected individuals on January 29, 2025. Impacted employees were offered complimentary credit monitoring and identity theft protection services.

The company also implemented enhanced security measures, such as rotating passwords and tokens, increasing monitoring capabilities, and strengthening access controls for privileged accounts

In its communications with regulators and employees, HPE emphasized its commitment to safeguarding personal information and mitigating risks associated with the breach.

The incident highlights ongoing vulnerabilities in cloud-based systems like Microsoft Office 365. Experts have pointed out that such breaches often exploit weak authentication practices or unprotected legacy accounts.

The attack underscores the need for robust cybersecurity measures, including multi-factor authentication (MFA) and tighter endpoint controls.

Midnight Blizzard’s activities appear to be part of a broader espionage effort targeting governments, corporations, and IT service providers worldwide. The group is known for leveraging sophisticated techniques such as password spraying and abusing OAuth applications to maintain persistent access.

This is not the first time HPE has faced cyberattacks. In past years, the company dealt with breaches involving Chinese threat actors and vulnerabilities in its Aruba Central network monitoring platform.

The latest attack adds to growing concerns about state-sponsored cyber espionage targeting critical technology firms. As investigations continue,

HPE has assured stakeholders that it will take all necessary steps to address the incident and prevent future breaches. However, this event serves as a stark reminder of the escalating cyber threats faced by enterprises globally.

Tags:

AptAttackBreachCybersecurityExploitHackerSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

CISA Warns: Windows Cloud Files 0 Vulnerability Attack

Next Post

Magecart Hijacks Checkout & Accounts with Massive Malicious

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us