DarkWebInformer ,
@DarkWebInformer@infosec.exchange avatar

Pretty sure ZScaler has been breached.

🚨🚨Notorious threat actor,
@InteIBroker
, is selling access to a large Cybersecurity company. Price: $20,000. Details below.

Revenue: $1.8 Billion
Access includes:

  • Confidential and highly critical logs packed with credentials
  • SMTP Access
  • PAuth Pointer Auth Access
  • SSL Passkeys & SSL Certificates
  • some others (will be on contact)
    Price: $20K in XMR or ETH
    Middleman / Escrow accepted (Auto Escrow or
    @Baphomet
    )
    Message me on the forums for a point of contact.
    Proof of funds is required.
    I am only selling to reputable members. No time wasters or default rank users.

X Link: https://twitter.com/DarkWebInformer/status/1788179513353891977

thint ,

As an employee of Zscaler, I can confirm that the claim of a breach at our company is completely inaccurate and unfounded. Zscaler's security measures remain firmly in place and fully effective at protecting our systems and networks.
We regularly see attempted attacks and rumors circulating, but it is crucial to rely only on official communications from Zscaler itself to get factual updates and information. Unverified claims about breaches or cyber incidents often turn out to be misinformation or false rumors.
Zscaler has established official channels to communicate transparently about the security status of our products and services. Unless you see an announcement directly from us, any claims of a successful breach should be viewed as unreliable hearsay.

I encourage everyone to be cautious about spreading unverified information that could potentially undermine cybersecurity through misinformation and rumors. Zscaler's networks and services remain secure, and we are committed to promoting accuracy over unsubstantiated claims or speculation. Please let me know if you have any other questions.

k3ym0 ,
@k3ym0@infosec.exchange avatar

@thint hope you ran that statement by PR and legal there, bud.

jerry ,
@jerry@infosec.exchange avatar
jerry ,
@jerry@infosec.exchange avatar

@k3ym0 @DarkWebInformer @thint I should probably temper this by saying that in my career, particularly over the past few years, my employer was the subject of a bunch of BS claims, and I have wanted to do this very thing - try to set the record straight by calling out what I perceived as hyperbolic speculation, rumor compounded by more rumor. It’s also my experience that I’d be dealing with two problems instead of one if I made those posts and the rumors later turned out to be true.

In this instance, it appears that what may have been impacted was a lab and so hopefully no impact to client or employee data.

thint ,

@jerry @k3ym0 @DarkWebInformer I see where you're coming from and appreciate your input. However, the claims are so exaggerated that leaving them unanswered could let a fabricated threat shape the story and cause unnecessary damage. I've shared an additional update and will provide more information if needed, but this situation is clearly overblown

jerry ,
@jerry@infosec.exchange avatar
DarkWebInformer OP ,
@DarkWebInformer@infosec.exchange avatar

@jerry ikr.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • cybersecurity
  • kamenrider
  • Rutgers
  • jeremy
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • loren
  • steinbach
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • WatchParties
  • WarhammerFantasy
  • supersentai
  • itdept
  • AgeRegression
  • mauerstrassenwetten
  • MidnightClan
  • space_engine
  • learnviet
  • bjj
  • Teensy
  • khanate
  • electropalaeography
  • neondivide
  • Mordhau
  • fandic
  • All magazines