Sunday, January 18, 2026

Cisco Confirms Data Breach Exposing User Profiles from Cisco.com

Cisco Systems has confirmed that a sophisticated voice phishing (vishing) attack led to the theft of basic profile information for a subset of users on its Cisco.com platform.

The company immediately contained the breach and launched an investigation, determining that only non-sensitive account metadata was accessed. No customer proprietary data, passwords, or product systems were affected.

On July 24, 2025 (GMT+9), Cisco was alerted to unauthorized activity in one instance of a third-party, cloud-based Customer Relationship Management (CRM) system used by the company.

The breach was initiated when a threat actor employed a vishing technique—calling and impersonating a trusted contact—to trick a Cisco representative into revealing authentication credentials.

Once authenticated, the attacker accessed the CRM environment and exported profile records.

Cisco’s forensics team swiftly revoked the compromised credentials and disabled the malicious session.

The rapid response ensured no further exfiltration could occur. Cisco also confirmed that other CRM instances and its internal systems remained secure throughout the incident.

Scope of Data Exfiltration and Impact

The investigation revealed that the attacker obtained only basic account profile data for users who had registered for Cisco.com accounts. The exported information included:

  • Full name.
  • Organization name.
  • Mailing address.
  • Cisco-assigned user ID.
  • Email address.
  • Phone number.
  • Account-related metadata (e.g., account creation date).

Crucially, the breach did not compromise any sensitive information such as passwords, payment details, or confidential customer and partner data.

Cisco emphasized that no proprietary or internal corporate data was exposed, and there was no evidence of product or service disruptions as a consequence of this event.

Affected individuals have been notified where required by applicable data protection regulations. Cisco has also reported the incident to relevant supervisory authorities and is cooperating fully with ongoing inquiries.

Remediation Measures

In response to the vishing incident, Cisco is implementing several security enhancements to fortify defenses against social engineering attacks:

  1. Enhanced Employee Training
    All personnel who interact with external contacts will undergo mandatory re-education sessions focused on vishing recognition and secure credential handling.
  2. Multi-Factor Authentication Hardening
    Cisco is reviewing and strengthening multi-factor authentication (MFA) protocols across all third-party services to ensure compromised credentials alone cannot grant access.
  3. CRM Access Monitoring
    The company has increased real-time monitoring and alerting on its CRM platforms to detect anomalous login patterns and data export activities more rapidly.
  4. Phishing Simulation Exercises
    Regular internal testing through simulated phishing and vishing scenarios will reinforce staff awareness and response readiness.

Cisco’s Chief Security Officer remarked, “While we regret that any user data was exposed, our swift containment and transparent communication prioritizes customer trust.

This incident underscores the persistent threat of social engineering, and we are committed to learning from it and bolstering our defenses.”

Customers and partners seeking more information or assistance are encouraged to contact their dedicated Cisco account teams. Cisco reiterated its apology for any inconvenience or concern and reaffirmed its dedication to safeguarding user information and maintaining operational integrity.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks
Ethan Brooks
Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent News

Recent News