US chip large Nvidia has claimed small business exercise has been unaffected by a cyber “incident” just after previously reviews prompt IT techniques were knocked offline for two days.
A report in The Telegraph late final week claimed that areas of the Santa Clara-headquartered firm’s company were being “completely compromised” throughout the attack.
Independently, dark web intelligence experts posted screenshots indicating that the Lapsus ransomware team was responsible. They appear to expose that the South American group already leaked password hashes for all Nvidia employees and that it experienced 1TB of stolen facts in its possession.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Having said that, a quick Nvidia statement played down the seriousness of the incident.
“We are investigating an incident. Our organization and professional things to do continue uninterrupted. We are nonetheless functioning to evaluate the nature and scope of the occasion and don’t have any added facts to share at this time,” it mentioned.
A separate report from Bloomberg cited a “person acquainted with the incident” who claimed the attack was reasonably insignificant and not linked to any ongoing Russian condition-backed cyber activity.
Different claims suggest that the chip corporation had essentially strike again at its attackers in an endeavor to encrypt the stolen facts. Screenshots from Lapsus brand name the company as “criminals” because it turned the tables on the team to deploy ransomware on its servers.
“Access to Nvidia personnel VPN involves the Personal computer to be enrolled in mobile gadget management,” the group mentioned. “With this they were being equipped to connect to a VM we use. Indeed, they encrypted the facts. Nonetheless, we have a backup and it is harmless from scum.”
Hacking back like this is not believed to be common apply among security teams, presented the prospective authorized implications.
Even so, attitudes to it are softening in the marketplace. In a 2019 poll from Venafi, nearly 3-quarters (72%) of respondents said that country-states should really be equipped to “hack back” when cyber-criminals target their infrastructure.
Some sections of this short article are sourced from:
www.infosecurity-magazine.com