US chip large Nvidia has claimed small business exercise has been unaffected by a cyber “incident” just after previously reviews prompt IT techniques were knocked offline for two days.
A report in The Telegraph late final week claimed that areas of the Santa Clara-headquartered firm’s company were being “completely compromised” throughout the attack.
Independently, dark web intelligence experts posted screenshots indicating that the Lapsus ransomware team was responsible. They appear to expose that the South American group already leaked password hashes for all Nvidia employees and that it experienced 1TB of stolen facts in its possession.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Having said that, a quick Nvidia statement played down the seriousness of the incident.
“We are investigating an incident. Our organization and professional things to do continue uninterrupted. We are nonetheless functioning to evaluate the nature and scope of the occasion and don’t have any added facts to share at this time,” it mentioned.
A separate report from Bloomberg cited a “person acquainted with the incident” who claimed the attack was reasonably insignificant and not linked to any ongoing Russian condition-backed cyber activity.
Different claims suggest that the chip corporation had essentially strike again at its attackers in an endeavor to encrypt the stolen facts. Screenshots from Lapsus brand name the company as “criminals” because it turned the tables on the team to deploy ransomware on its servers.
“Access to Nvidia personnel VPN involves the Personal computer to be enrolled in mobile gadget management,” the group mentioned. “With this they were being equipped to connect to a VM we use. Indeed, they encrypted the facts. Nonetheless, we have a backup and it is harmless from scum.”
Hacking back like this is not believed to be common apply among security teams, presented the prospective authorized implications.
Even so, attitudes to it are softening in the marketplace. In a 2019 poll from Venafi, nearly 3-quarters (72%) of respondents said that country-states should really be equipped to “hack back” when cyber-criminals target their infrastructure.
Some sections of this short article are sourced from:
www.infosecurity-magazine.com