• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Nvidia Appears to Brush Off Ransomware Attack

You are here: Home / General Cyber Security News / Nvidia Appears to Brush Off Ransomware Attack
February 28, 2022

US chip large Nvidia has claimed small business exercise has been unaffected by a cyber “incident” just after previously reviews prompt IT techniques were knocked offline for two days.

A report in The Telegraph late final week claimed that areas of the Santa Clara-headquartered firm’s company were being “completely compromised” throughout the attack.

Independently, dark web intelligence experts posted screenshots indicating that the Lapsus ransomware team was responsible. They appear to expose that the South American group already leaked password hashes for all Nvidia employees and that it experienced 1TB of stolen facts in its possession.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Having said that, a quick Nvidia statement played down the seriousness of the incident.

“We are investigating an incident. Our organization and professional things to do continue uninterrupted. We are nonetheless functioning to evaluate the nature and scope of the occasion and don’t have any added facts to share at this time,” it mentioned.

A separate report from Bloomberg cited a “person acquainted with the incident” who claimed the attack was reasonably insignificant and not linked to any ongoing Russian condition-backed cyber activity.

Different claims suggest that the chip corporation had essentially strike again at its attackers in an endeavor to encrypt the stolen facts. Screenshots from Lapsus brand name the company as “criminals” because it turned the tables on the team to deploy ransomware on its servers.

“Access to Nvidia personnel VPN involves the Personal computer to be enrolled in mobile gadget management,” the group mentioned. “With this they were being equipped to connect to a VM we use. Indeed, they encrypted the facts. Nonetheless, we have a backup and it is harmless from scum.”

Hacking back like this is not believed to be common apply among security teams, presented the prospective authorized implications.

Even so, attitudes to it are softening in the marketplace. In a 2019 poll from Venafi, nearly 3-quarters (72%) of respondents said that country-states should really be equipped to “hack back” when cyber-criminals target their infrastructure.


Some sections of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «reborn of emotet: new features of the botnet and how Reborn of Emotet: New Features of the Botnet and How to Detect it
Next Post: CISA Warns of High-Severity Flaws in Schneider and GE Digital’s SCADA Software cisa warns of high severity flaws in schneider and ge digital's»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Arkansas Sues Health System for Abandoning Patient Files
  • Netflix to Charge Password Sharers
  • Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines
  • Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops
  • Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware
  • IT Pro News In Review: Job losses at Arm, warnings over Kaspersky software, Microsoft using ads
  • Google exposes ‘uniquely personal’ access broker behind worst Conti, FIN12 ransomware attacks
  • NCSC Launches Awareness Campaign to Strengthen Password Practices
  • Cyclops Blink Malware Expands to Target Asus
  • Aircraft Disrupted by Satellite Jamming Following Russian Invasion

Copyright © TheCyberSecurity.News, All Rights Reserved.