In July 2025, Cisco experienced a security breach involving a vishing attack that successfully targeted an internal employee. The breach led to unauthorized access and data exfiltration from a third-party cloud-based CRM platform, impacting user accounts on Cisco.com. While no critical infrastructure or sensitive enterprise data was accessed, the incident highlights the persistent risks posed by social engineering and third-party service dependencies.
A Cisco employee was socially engineered via a vishing attack, allowing the attacker to gain access credentials or session-based access to a third-party CRM system. This method allowed the adversary to:
The attacker did not exploit a technical vulnerability but instead leveraged human manipulation tactics (vishing) to infiltrate Cisco’s environment via a trusted access channel.
The breach exclusively affected registered users of Cisco.com, and involved the export of basic profile data:
No passwords, sensitive enterprise information, financial data, or Cisco products/services were compromised.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy