The hacker group that recently broke into systems belonging to graphics chip maker Nvidia has released two of the company’s old code-signing certificates. Researchers warn the drivers could be used to sign kernel-level malware and load it on systems that have driver signature verification.
The certificates were part of a large cache of files that hackers claim totals 1TB and includes source code and API documentation for GPU drivers. Nvidia confirmed it was the target of an intrusion and that the hackers took “employee passwords and some Nvidia proprietary information,” but did not confirm the size of the data breach.
What happened with the Nvidia data breach?
On February 24 an extortion group calling itself LAPSUS$ claimed publicly that it had administrative access to multiple Nvidia systems for around a week and managed to exfiltrate 1TB of data including hardware schematics, driver source code, firmware, documentation, private tools and SDKs, and “everything about Falcon” — a hardware security technology embedded in Nvidia GPUs that’s meant to prevent those GPUs from being misprogrammed.
More Stories
WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks
WP Ultimate CSV Importer flaws expose 20,000 websites to attacks enabling attackers to achieve full site compromise Read More
The AI Fix #44: AI-generated malware, and a stunning AI breakthrough
In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art,...
Ukraine Blames Russia for Railway Hack, Labels It “Act of Terrorism”
The CERT-UA investigation concluded that the attack’s techniques were “characteristic of Russian intelligence services” Read More
New Phishing Attack Combines Vishing and DLL Sideloading Techniques
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor...
Google to Switch on E2EE for All Gmail Users
Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts Read...
Cybercriminals Expand Use of Lookalike Domains in Email Attacks
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals...