Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsEverest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
Cybersecurity

Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems

•February 3, 2026
0
HackRead
HackRead•Feb 3, 2026

Companies Mentioned

HP

HP

HPQ

Poly

Poly

McDonald’s

McDonald’s

MCD

Under Armour

Under Armour

Chrysler

Chrysler

ASUS

ASUS

2357

Iberia Airlines

Iberia Airlines

Petrobras

Petrobras

PBR

AT&T

AT&T

T

Plantronics

Plantronics

Nissan Canada

Nissan Canada

Dublin Airport

Dublin Airport

Why It Matters

If the claims are accurate, they highlight the lingering security risks of legacy systems that remain unpatched after corporate acquisitions. The incident could pressure HP to reassess its integration and monitoring of inherited assets, influencing broader industry practices around legacy asset management.

Key Takeaways

  • •Everest claims 90 GB data exfiltrated from legacy Polycom systems
  • •Files date 2017‑2019, likely pre‑HP acquisition
  • •No customer data or active HP Poly systems affected
  • •HP has not confirmed breach; response pending
  • •Threat actor threatens publication after nine‑day countdown

Pulse Analysis

Ransomware operators increasingly target legacy infrastructure that often slips through the security net after mergers and acquisitions. Older codebases, development environments, and build servers may lack modern hardening measures, making them attractive low‑effort targets. In the Everest case, the exposed artifacts—source‑code trees and engineering logs—date back to 2017‑2019, a period when Polycom operated independently. Such assets can contain proprietary designs or undocumented vulnerabilities that, if weaponized, could aid future attacks against both the original vendor and its new parent.

HP’s acquisition trail—Plantronics in 2018, rebranding to Poly in 2019, and the 2022 purchase of Polycom—creates a complex tapestry of IT estates. Integrating disparate environments often leaves shadow IT and orphaned servers that remain connected to corporate networks. While HP reports no impact on current production systems, the mere possibility of lingering legacy nodes underscores the need for comprehensive asset inventories and continuous monitoring. Verifying the authenticity of threat‑actor claims is crucial; unverified leaks can trigger unnecessary panic, yet they also serve as early warnings for hidden exposure.

The broader market watches Everest’s tactics as a bellwether for ransomware evolution. Public countdowns and data‑theft narratives aim to amplify pressure on victims, leveraging media attention to extract ransoms or concessions. Enterprises should prioritize hardening legacy environments, enforce strict network segmentation, and conduct regular forensic audits of inherited assets. By proactively addressing these hidden risks, organizations can reduce the attack surface that groups like Everest exploit, safeguarding both intellectual property and operational continuity.

Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...