The hacker group that recently broke into systems belonging to graphics chip maker Nvidia has released two of the company’s old code-signing certificates. Researchers warn the drivers could be used to sign kernel-level malware and load it on systems that have driver signature verification.
The certificates were part of a large cache of files that hackers claim totals 1TB and includes source code and API documentation for GPU drivers. Nvidia confirmed it was the target of an intrusion and that the hackers took “employee passwords and some Nvidia proprietary information,” but did not confirm the size of the data breach.
What happened with the Nvidia data breach?
On February 24 an extortion group calling itself LAPSUS$ claimed publicly that it had administrative access to multiple Nvidia systems for around a week and managed to exfiltrate 1TB of data including hardware schematics, driver source code, firmware, documentation, private tools and SDKs, and “everything about Falcon” — a hardware security technology embedded in Nvidia GPUs that’s meant to prevent those GPUs from being misprogrammed.
More Stories
LockBit, Black Basta, Play Dominate Ransomware in Q1 2024
The data from ReliaQuest also suggests LockBit faced a significant setback due to law enforcement action Read More
UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFA
Andrew Witty made the claims in a written testimony submitted before a House subcommittee hearing Read More
1 in 5 US Ransomware Attacks Triggers Lawsuit
Comparitech found that 18% of ransomware incidents in the US led to a lawsuit in 2023, with 59% of completed...
Lawsuits and Company Devaluations Await For Breached Firms
New report from Netwrix reveals unplanned expenses impact half of breached firms, including a surge in lawsuits Read More
AI Voice Scam
Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money...
DBIR: Vulnerability Exploits Triple as Initial Access Point for Data Breaches
The growth of software supply chain attacks pushed vulnerability exploits to the third most used initial access method, Verizon found...