In current months, a cybercriminal gang acknowledged as LAPSUS$ has claimed accountability for a quantity of higher-profile attacks against technology companies, which include:
- T-Cell (April 23, 2022)
In addition to these attacks, LAPSUS$ was also ready to effectively launch a ransomware attack against the Brazilian Ministry of Wellbeing.
Although substantial-profile cyber-attacks are surely absolutely nothing new, there are various points that make LAPSUS$ exclusive.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
- The alleged mastermind of these attacks and various other alleged accomplices were being all young people.
- Not like additional common ransomware gangs, LAPSUS$ has a quite sturdy social media presence.
- The gang is greatest acknowledged for facts exfiltration. It has stolen supply code and other proprietary information and has normally leaked this details on the Internet.
LAPSUS$ stolen qualifications
In the case of Nvidia, for instance, the attackers gained access to hundreds of gigabytes of proprietary info, together with info about chips that the firm is producing. Perhaps a lot more disturbing nonetheless, LAPSUS$ claims to have stolen the credentials of thousands of Nvidia personnel. The actual amount of qualifications stolen is considerably unclear, with several tech news sites reporting differing quantities. Even so, Specops was in a position to receive around 30,000 passwords that ended up compromised in the breach.
The increase of cyber extortion
There are two significant takeaways from the LAPSUS$ attacks that organizations need to pay attention to. 1st, the LAPSUS$ attacks clearly illustrate that gangs of cybercriminals are no longer content material to execute run-of-the-mill ransomware attacks. Fairly than just encrypting information as has so generally been finished in the previous, LAPSUS$ looks considerably extra centered on cyber extortion. LAPSUS$ gains obtain to an organization’s most valuable intellectual house and threatens to leak that data until a ransom is paid out.
A technology organization could conceivably suffer irreparable harm by having its supply code, product or service roadmap, or study and growth data leaked, in particular if that knowledge ended up to be made out there to rivals.
Even even though the LAPSUS$ attacks have as a result significantly centered mostly on technology companies, any firm could conceivably turn out to be a target of this sort of an attack. As these, all corporations need to very carefully look at what they can be executing to preserve their most delicate information out of the fingers of cybercriminals.
Weak passwords at play
The other significant takeaway from the LAPSUS$ attacks was that even though there is no definitive information and facts about how the attackers received access to their victim’s networks, the checklist of leaked Nvidia qualifications that was acquired by Specops obviously reveals that quite a few workers have been working with incredibly weak passwords. Some of these passwords were being typical text (welcome, password, September, and so forth.), which are exceptionally prone to dictionary attacks. Several other passwords incorporated the organization identify as a section of the password (nvidia3d, mynvidia3d, etcetera.). At minimum just one personnel even went so far as to use the term Nvidia as their password!
While it is completely achievable that the attackers employed an preliminary penetration technique that was not primarily based on the use of harvested qualifications, it is far additional possible that these weak credentials performed a pivotal purpose in the attack.
This, of course, raises the dilemma of what other corporations can do to protect against their staff members from utilizing similarly weak passwords, creating the business susceptible to attack. Environment up a password coverage that calls for lengthy and complex passwords is a very good commence, but there is a lot more that companies need to be carrying out.
Protecting your possess group from a related attack
A single crucial measure that organizations can use to protect against the use of weak passwords is to make a customized dictionary of phrases or phrases that are not permitted to be utilized as a part of the password. Recall that in the Nvidia attack, staff members often utilized the phrase Nvidia possibly as their password or as a element of their password. A custom dictionary could have been made use of to avert any password from that contains the word Nvidia.
Another, even much more critical way that an organization can reduce the use of weak passwords is to create a coverage protecting against users from making use of any password that is recognized to have been leaked. When a password is leaked, that password is hashed and the hash is commonly additional to a database of password hashes. If an attacker acquires a password hash they can simply examine the hash to the hash databases, speedily revealing the password with out owning to execute a time-consuming brute power or dictionary-primarily based crack.
Specops Password Plan offers admins the resources that they have to have in get to make certain that end users steer clear of making use of weak passwords or passwords that are recognized to have been compromised. Specops makes it quick to make a password policy that complies with widespread password benchmarks, these as these defined by NIST. In addition to location length and complexity requirements, having said that, Specops enables admins to make dictionaries of text that are not to be utilised as a part of a password. On top of that, Specops maintains a database of billions of leaked passwords. User’s passwords can be automatically checked versus this databases, therefore preventing end users from applying a password that is regarded to have been compromised.
Found this report attention-grabbing? Adhere to THN on Facebook, Twitter and LinkedIn to examine additional special written content we post.
Some sections of this write-up are sourced from: