Nvidia hackers hit Samsung and leak huge data dump

Data Breach
Image Credit: Shutterstock (Image credit: Shutterstock)

The increasingly-notorious cybercrime group Lapsus$ has published a huge database, allegedly containing sensitive information from Samsung

The leak, containing 190GB of data broken into three separate databases, was released via torrent. 

Lapsus$ says the databases contain the source code for every Trusted Applet (TA) installed in Samsung’s TrustZone environment used for sensitive operations; algorithms for all biometric unlock operations; bootloader source code for all recent Samsung devices; confidential source code from Qualcomm; source code for Samsung’s activation servers; full source code for technology used for authorizing and authenticating Samsung accounts, including APIs and services.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

No confirmation, no ransom demands

The authenticity of the information has not been confirmed and Samsung has been silent on the matter. 

Still, should these files turn out to be authentic, it would mean that the company has suffered a breach of epic proportions, with potentially huge repercussions.

The torrent containing these files has already been downloaded by at least 400 peers, BleepingComputer reports, while Lapsus$ says it will be deploying more servers to increase the download speed. 

Samsung has also been asked to confirm if the threat actor demanded any ransom in exchange for keeping the data private.

Lapsus$ has been quite active recently, claiming responsibility for a major recent attack against Nvidia, where it claims it stole a terabyte of sensitive data.

Among the data were login credentials, and other identity-related information, on more than 70,000 Nvidia employees. Furthermore, the group alleged it stole intel that helped it create a tool that removes the hash rate blocker on the company’s latest GPU devices.

Nvidia has placed a limiter on its RTX 3000 GPU, to discourage Ethereum miners from gobbling up the entire supply. The tool was up for sale for $1 million, but whether or not it works as intended, or if it’s just another virus, is anyone’s guess.

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
No broadband network
Massive online data breach sees 2.7 billion records leaked - here's what we know
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
A top online gift card store may have exposed private data on hundreds of thousands of users
Data leak
Details of over 15,000 FortiGate devices leaked online, so be on your guard
HPE
HPE investigating claims that hacker breached developer environments, source code
Cartoon Phishing
One of the largest data leaks ever sees info on 1.5 billion people leaked online
A laptop with a red screen with a white skull on it with the message: &quot;RANSOMWARE. All your files are encrypted.&quot;
Major ransomware attack sees Tata Technologies hit - 1.4TB dataset with over 730,000 files allegedly stolen
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over