Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Cisco Says User Data Stolen in CRM Hack

Cisco has disclosed a data breach affecting Cisco.com user accounts, including names, email address, and phone numbers.

Cisco hacked

Cisco has disclosed a data breach impacting a third-party customer relationship management (CRM) system. 

The incident came to light on July 24, when Cisco learned that one of its representatives had been targeted in a vishing attack. The threat actor had managed to access and steal a “subset of basic profile information” from an instance of a third-party CRM system used by Cisco. 

The networking giant immediately took steps to terminate the hacker’s access to the CRM system. An investigation determined that the attacker obtained information provided by individuals who registered an account on Cisco.com.

The compromised information includes name, email address, phone number, organization name, address, a Cisco-assigned user ID, and metadata related to the account (eg, account creation date).

Cisco said the hacker did not obtain any confidential or proprietary information belonging to its organizational customers. Passwords or other types of sensitive data were also not affected. 

“Cisco did not identify any impact to our products or services, and no other Cisco CRM instances were affected,” Cisco said.

Advertisement. Scroll to continue reading.

Impacted users have been notified, as well as data protection authorities. 

“Every cybersecurity incident is an opportunity to learn, strengthen our resilience, and help the wider security community,” Cisco said. “We are implementing further security measures to mitigate the risk of similar incidents occurring in the future, including re-educating personnel on how to identify and protect against potential vishing attacks.”

This is not the only data breach suffered by Cisco recently. In December 2024, the notorious hacker IntelBroker leaked gigabytes of files, including source code, scripts, digital certificates, and configuration files pertaining to Cisco products.

Cisco confirmed the data was authentic, but said its systems had not been breached — the data was taken from a public-facing DevHub environment that served as a resource center for customers. While much of the data from this DevHub instance had already been public, some of the stolen files were not supposed to be public.

Related: Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report

Related: Tea App Takes Messaging System Offline After Second Security Issue Reported

Related: NASCAR Confirms Personal Information Stolen in Ransomware Attack

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Sumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.

Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.

John Hernandez has joined BlueVoyant as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.