Swedish Telecom Software Provider Enea AB Hit by Data Breach

Enea AB, a prominent Swedish company specializing in telecommunications network software, embedded systems, and cybersecurity solutions, has allegedly suffered a significant data breach. On November 16, 2025, sensitive internal data belonging to the company appeared on the underground cybercrime marketplace DarkForums.

The leak was orchestrated by a threat actor operating under the handle KaruHunters. Initial analysis indicates that the breach exposes internal development environments, potentially compromising software supply chains.


Key Incident Statistics

  • Victim: Enea AB (Stockholm, Sweden)
  • Leak Size: 183 MB
  • File Count: 15,446 files
  • Date Indexed: November 16, 2025
  • Compromised Data: Full names, Organization names, Usernames, Passwords, Internal documents, Source code, and Build configurations.

Technical Analysis of the Leak

I have reviewed the file structures and metadata associated with the 183 MB dump. The leak appears to be highly technical, suggesting the compromise of a development repository, build server, or testing environment rather than a consumer-facing CRM database.

1. Source Code and Build Artifacts

The file tree reveals a significant presence of C-based source code and script files (.c, .tcl, .sh). Specifically, the directory structures (src, tool) and filenames (test_server.c.txt, build_unix_aix.html, build_vxworks.html) suggest the theft of intellectual property related to database management systems and embedded operating system compatibility (VxWorks, AIX, SunOS).

2. Database Configuration and Testing

A large portion of the leaked data contains SQL scripts and database initialization files.

  • Test Databases: Multiple files reference a database named numismatics (coin collecting). The SQL queries (CREATE TABLE coin, CREATE TABLE mint) appear to be standard testing schemas used to verify database integrity and transaction handling.
  • Library Documentation: The leak includes extensive documentation and source files for GNU Readline and Berkeley DB (versions 12.1.6.0), indicating the breach may have targeted a repository where Enea manages open-source dependencies or custom database implementations.

3. Credential Exposure Risks

While much of the data appears to be structural code, the threat actor claims the dump includes Usernames and Passwords. In development environments, it is common for developers to hardcode credentials into testing scripts (genfkey.test.txt, test_server.c.txt) or configuration files. If valid, these credentials could allow threat actors to pivot deeper into Enea’s internal network.

Note on Data Validity: The presence of files like sqlite_ver60.html and upgrade_11gr2 suggests this may be a legacy codebase or a specific maintenance branch, rather than the company’s current flagship product line.


Implications and Risk Assessment

Supply Chain Vulnerability: As Enea provides software for telecommunications networks and embedded devices, the exposure of source code and build flags creates a supply chain risk. Threat actors could analyze the code (spaceanal.tcl, fragck.tcl) to discover zero-day vulnerabilities in how Enea’s software handles memory or database transactions.

Privacy Impact: Although the visible snippets focus on code, the actor’s claim of “Full names” and “Email addresses” likely refers to developer commits, internal documentation metadata, or user tables within the test databases. While less severe than a customer database breach, this exposes employees to targeted social engineering and phishing attacks.