Hacking group leaks Nvidia data following alleged ransomware attack
LAPSU$ claims to have released Nvidia source code and highly confidential GPU driver data
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The ransomware group that claimed to be behind last week’s Nvidia cyber attack has released part of the data it stole from the company.
Nvidia was the victim of a ransomware attack last week, according to a Bloomberg source. The incident wasn’t connected to the Ukraine conflict and, at the time, looked to be relatively minor.
However, the attack may have been more serious than first thought, as Nvidia’s email systems and developer tools reportedly suffered outages as a result, according to the Telegraph.
A source told the publication that the intrusion had completely compromised the company’s internal systems, although some email services did return on Friday. At the time it was unclear whether any data had been stolen or deleted from the company.
Today, the extortion group LAPSU$ announced it has leaked part one of Nvidia data, which apparently contains source code and highly confidential or secret data from various parts of Nvidia’s GPU drivers, according to Telegram posts made by the group and seen by cyber security researcher Soufiane Tahiri.
The group included a download link to the data in its post, although this is yet to be verified.
LAPSU$ took responsibility for the attack on 26 February, saying it breached Nvidia and exfiltrated over 1TB of data. It planned to leak all Nvidia employees passwords and NTLM hashes.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
However, LAPSU$ also claimed that Nvidia launched a ransomware attack of its own on the group in retaliation. The group called the company criminals, underlining it was fortunate it had backed up its data.
LAPSU$ said that Nvidia was able to carry out the hack as access to Nvidia’s employee VPN requires the PC to be enrolled in mobile device management. Through this, the company was able to connect to a virtual machine the hacking group uses.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
“Yes they successfully encrypted the data,” wrote the group in a Telegram post. “However we have a backup and it’s safe from scum!!!”
The group also said it didn’t plan to leak the data, but Nvidia made the “scummy move” to try and delete its personal data.
“We are investigating an incident,” a spokesperson from Nvidia told IT Pro. “Our business and commercial activities continue uninterrupted. We are still working to evaluate the nature and scope of the event and don't have any additional information to share at this time."
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
AWS CEO Matt Garman isn’t convinced AI spells the end of the software industryNews Software stocks have taken a beating in recent weeks, but AWS CEO Matt Garman has joined Nvidia's Jensen Huang and Databricks CEO Ali Ghodsi in pouring cold water on the AI-fueled hysteria.
-
Deepfake business risks are growingIn-depth As the risk of being targeted by deepfakes increases, what should businesses be looking out for?
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
