• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Nvidia Admits Hackers Stole Employee and Internal Data

You are here: Home / General Cyber Security News / Nvidia Admits Hackers Stole Employee and Internal Data
March 2, 2022

Nvidia has unveiled more aspects of an evident ransomware attack on its networks, admitting that inside details has been taken.

The US chip big experienced previously offered small absent, stating only that its “business and professional functions continue uninterrupted” even though it investigated the attack, which was to start with documented previous 7 days.

Having said that, a new statement has absent more.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Shortly after identifying the incident, we more hardened our network, engaged cybersecurity incident response gurus, and notified regulation enforcement,” the Nvidia statement revealed.

“We have no proof of ransomware remaining deployed on the Nvidia ecosystem or that this is associated to the Russia-Ukraine conflict. Nonetheless, we are aware that the threat actor took personnel qualifications and some Nvidia proprietary data from our systems and has started leaking it on the net.”

The group in problem is believed to be the Lapsus ransomware gang, which is saying to have 1TB of Nvidia knowledge in its possession.

In accordance to screenshots on Twitter, the group is also boasting to have “complete silicon, graphics and personal computer chipset documents for all modern Nvidia GPUs,” and threatened to leak information on the company’s Lite Hash Level (LHR) technology.

This was introduced to graphics cards to limit their use in cryptocurrency mining, so any leak of this proprietary tech could have main repercussions in the crypto-mining room, assuming the hackers are not bluffing.

There was no phrase from Nvidia on whether or not it had “hacked back” at the team next the breach, as Lapsus claimed.

The menace actors mentioned Nvidia experienced applied the cellular unit management link used by the team to entry an staff VPN, in purchase to concentrate on and encrypt its facts. However, they claimed to have offline backups.

Nvidia has unveiled additional details of an apparent ransomware attack on its networks, admitting that inner details has been taken.

The US chip big had previously given small absent, expressing only that its “business and professional routines continue uninterrupted” even though it investigated the attack, which was to start with described previous week.

Having said that, a new statement has long gone further more.

“Shortly right after finding the incident, we even further hardened our network, engaged cybersecurity incident response gurus, and notified regulation enforcement,” it exposed.

“We have no proof of ransomware currently being deployed on the Nvidia environment or that this is related to the Russia-Ukraine conflict. Even so, we are conscious that the menace actor took employee credentials and some Nvidia proprietary details from our programs and has begun leaking it online.”

The team in question is imagined to be the Lapsus ransomware gang, which is claiming to have 1TB of Nvidia info in its possession.

According to screenshots on Twitter, the group is also saying to have “complete silicon, graphics and pc chipset information for all new Nvidia GPUs,” and threatened to leak data on the company’s Lite Hash Level (LHR) technology.

This was introduced to graphics playing cards to restrict their use in cryptocurrency mining, so any leak of this proprietary tech could have significant repercussions in the crypto-mining place – assuming the hackers are not bluffing.

There was no phrase from Nvidia on no matter if it experienced “hacked back” at the team next the breach, as Lapsus claimed.

The danger actors claimed Nvidia experienced utilized the cell product management link applied by the group to obtain an staff VPN, in get to concentrate on and encrypt its data. Even so, they claimed to have offline backups.


Some elements of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Apple and Google Turn Off Map Features to Help Ukraine
Next Post: Nvidia confirms data breach as hackers make additional demands nvidia confirms data breach as hackers make additional demands»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
  • NortonLifeLock and Avast merger could reduce competition, CMA warns
  • Thousands of Mobile Apps Expose User Data Via Cloud Misconfigurations
  • NSW ditches e-voting system for 2023 election
  • Kaspersky Hits Back at “Politically Motivated” BSI Advisory
  • Germany advises against using Kaspersky software due to hacking risk
  • CISA: Fix MFA and Patch Promptly to Stop Russian Attackers
  • German Government Warns Against Using Russia’s Kaspersky Antivirus Software
  • Multiple Flaws Uncovered in ClickHouse OLAP Database System for Big Data

Copyright © TheCyberSecurity.News, All Rights Reserved.