Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Hackers steal employee and internal data from Nvidia

Nvidia has released more information regarding an apparent ransomware attack on its networks

by Josh.Breaker-Rolfe
March 4, 2022
in Cyber Bites
nvidia technology
Share on FacebookShare on Twitter

Nvidia has admitted that employee and internal data was stolen in an apparent ransomware attack last week.

The chip behemoth initially gave little away, announcing only that its  “business and commercial activities continue uninterrupted” while the attack was investigated.

A new statement provided more information:

“Shortly after discovering the incident, we further hardened our network, engaged cybersecurity incident response experts, and notified law enforcement. We have no evidence of ransomware being deployed on the Nvidia environment or that this is related to the Russia-Ukraine conflict. However, we are aware that the threat actor took employee credentials and some Nvidia proprietary information from our systems and has begun leaking it online.”

Lapsus ransomware gang is believed to be responsible, with the group claiming that it has 1TB of Nvidia information in its possession.

Twitter screenshots suggest that the group claims to have  “complete silicon, graphics and computer chipset files for all recent Nvidia GPUs,” and threatened to release information regarding the organisation’s Lite Hash Rate technology (LHR).

 

Delving deeper into the situation, threat intelligence analysts at Searchlight Security provided the following:

“If LAPSUS$ are to be believed, Nvidia’s systems were compromised via an employee’s VPN (Figure 1).

“Many dark web forums host auctions selling both user and administrator access to corporate VPNs. Sellers will variously specify the target company’s location, yearly revenue and size, industry or sector, brand of VPN being used and access rights available (Figures 2-3).

“Better dark web monitoring would enable companies to plug in their specifications in these categories and review a real-time feed of cybercriminal chatter relevant to their organisation, allowing them to assess their risk and adjust procedures accordingly. In addition, monitoring threat groups’ forum posts and messaging app chats builds a clearer picture of their modus operandi; LAPSUS$, for example, have shown a tendency to “tease” their attacks several days prior to their official announcement (Figures 4-5).

 

Learning the habits of these malicious actors can help businesses prevent and respond to cyberattacks as efficiently as possible, protecting valuable assets such as intellectual property from falling into the wrong hands (Figure 6).”

Ioannis Fragkoulopoulos, Customer Security and Professional services Director at Obrela commented on the incident, advising customers to “update their account log-in details, and not just for those accounts.” He added that “attackers could use the already leaked information to gain access to a number of user accounts to steal more information or launch larger attacks targeted at company networks. Organisations as a whole must practice cyber-resilience and take steps to mitigate the risks cyberattacks pose, before they actually happen. Cyberattacks are here to stay, so the only defence today is getting into a post-breach mindset before they happen to limit the negative outcomes. While there can be no denying that data breaches are commonplace today, you would hope a company as large as this would learn from previous incidents to harden its systems and improve security.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Toyota hit with ransomware attack, stops production

Next Post

Conti ransomware group suffers another leak

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information