- Joined
- Jan 2, 2020
Genuinely surprised there wasn't a topic for this aside from the leak that happened last year
Article: https://securityaffairs.co/wordpress/128573/data-breach/nvidia-data-breach.html
Archive: https://archive.md/G1N2p
Article: https://www.guru3d.com/news-story/n...gets-more-serioushackers-make-new-demand.html Archive: https://archive.md/0hppv
Download of leaked stuff (Torrent) : https://anonfiles.com/13h0S3Kbx6/NVIDIA_LEAKS_PARTONE_TORRENT
Magnet Link:
Article: https://securityaffairs.co/wordpress/128573/data-breach/nvidia-data-breach.html
Archive: https://archive.md/G1N2p
The chipmaker giant Nvidia was recently the victim of a cyber attack that impacted some of its systems for two days. The security breach is not connected to the ongoing crisis in Ukraine, according to a person familiar with the incident.
The incident also impacted the company’s developer tools and email systems, but business and commercial activities were not affected.
“Our business and commercial activities continue uninterrupted,” Nvidia said in a statement. “We are still working to evaluate the nature and scope of the event and don’t have any additional information to share at this time.”
The Lapsus$ ransomware gang is claiming responsibility for this attack, the group announced to have stolen 1 TB of data from Nvidia’s network. The ransomware gang leaked online around 20GB of data, including credentials for all Nvidia employees.
The company launched an investigation into the incident to determine the extent of the intrusion that confirmed that the attackers have stolen data from the chipmaker.
NVIDIA said employee credentials and proprietary information were stolen during a cyberattack they announced on Friday.
The chipmaker giant discovered the intrusion on February 23, the attack also impacted its IT resources.
“Access to NVIDIA employee VPN requires the PC to be enrolled in MDM (Mobile Device Management). With this they were able to connect to a [virtual machine] we use. Yes they successfully encrypted the data,” the group claimed in a subsequent message.” the LAPSU$ ransomware gang wrote on its Telegram change. “However we have a backup and it’s safe from scum! We are not hacked by a competitors groups or any sorts.”
Below is the statement shared by NVIDIA with some websites and published by BleepingComputer.
“On February 23, 2022, NVIDIA became aware of a cybersecurity incident which impacted IT resources. Shortly after discovering the incident, we further hardened our network, engaged cybersecurity incident response experts, and notified law enforcement.” reads the statement. “We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Russia-Ukraine conflict. However, we are aware that the threat actor took employee credentials and some NVIDIA proprietary information from our systems and has begun leaking it online. Our team is working to analyze that information. We do not anticipate any disruption to our business or our ability to serve our customers as a result of the incident.”
The incident also impacted the company’s developer tools and email systems, but business and commercial activities were not affected.
“Our business and commercial activities continue uninterrupted,” Nvidia said in a statement. “We are still working to evaluate the nature and scope of the event and don’t have any additional information to share at this time.”
The Lapsus$ ransomware gang is claiming responsibility for this attack, the group announced to have stolen 1 TB of data from Nvidia’s network. The ransomware gang leaked online around 20GB of data, including credentials for all Nvidia employees.
The company launched an investigation into the incident to determine the extent of the intrusion that confirmed that the attackers have stolen data from the chipmaker.
NVIDIA said employee credentials and proprietary information were stolen during a cyberattack they announced on Friday.
The chipmaker giant discovered the intrusion on February 23, the attack also impacted its IT resources.
“Access to NVIDIA employee VPN requires the PC to be enrolled in MDM (Mobile Device Management). With this they were able to connect to a [virtual machine] we use. Yes they successfully encrypted the data,” the group claimed in a subsequent message.” the LAPSU$ ransomware gang wrote on its Telegram change. “However we have a backup and it’s safe from scum! We are not hacked by a competitors groups or any sorts.”
Below is the statement shared by NVIDIA with some websites and published by BleepingComputer.
“On February 23, 2022, NVIDIA became aware of a cybersecurity incident which impacted IT resources. Shortly after discovering the incident, we further hardened our network, engaged cybersecurity incident response experts, and notified law enforcement.” reads the statement. “We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Russia-Ukraine conflict. However, we are aware that the threat actor took employee credentials and some NVIDIA proprietary information from our systems and has begun leaking it online. Our team is working to analyze that information. We do not anticipate any disruption to our business or our ability to serve our customers as a result of the incident.”
The aftermath of the NVIDIA breach is slowly disclosing more and more info about pending products. Yesterday an older version of DLSS source code was already spotted, new GPU architectures have been confirmed as in Blackwell, Hopper and Ada Lovelace. And today the number of streaming multiprocessors of Ampere successors.
Twitter user La Frite David, has reviewed the data that has leaked thus far, and it specifies the number of streaming multiprocessors in the Ampere successors, among other things. This allows the number of shader cores to be calculated. The highest model, AD102, is expected to have up to 144 SMS or 18,432 cores, which corresponds to a claim made by the end of 2020. Furthermore, AD103, AD104, AD106, and AD107 are examined, with their claimed specifications listed below.
The hacking team now threatened to leak all data if Nvidia does not remove the hash rate restriction on RTX 30-series LHR devices. Also, they're advancing and are demanding that Nvidia totally open-sources its GPU drivers for Windows, macOS, and Linux. If the corporation violates this, Lapsus$ will publish not only chipset data but also information about the present and forthcoming GPUs.
Twitter user La Frite David, has reviewed the data that has leaked thus far, and it specifies the number of streaming multiprocessors in the Ampere successors, among other things. This allows the number of shader cores to be calculated. The highest model, AD102, is expected to have up to 144 SMS or 18,432 cores, which corresponds to a claim made by the end of 2020. Furthermore, AD103, AD104, AD106, and AD107 are examined, with their claimed specifications listed below.
Ampere | Ada Lovelace | |||||
---|---|---|---|---|---|---|
GPU | SMx128 | Shader cores | GPU | SMx128 | Shader cores | |
102 | 84 | 10.752 | 102 | 144 | 18.432 | |
103S | 60 | 7.680 | 103 | 84 | 10.752 | |
104 | 48 | 6.144 | 104 | 60 | 7.680 | |
106 | 30 | 3.840 | 106 | 36 | 4.608 | |
107 | 20 | 2.560 | 107 | 24 | 3.072 |
The hacking team now threatened to leak all data if Nvidia does not remove the hash rate restriction on RTX 30-series LHR devices. Also, they're advancing and are demanding that Nvidia totally open-sources its GPU drivers for Windows, macOS, and Linux. If the corporation violates this, Lapsus$ will publish not only chipset data but also information about the present and forthcoming GPUs.
Download of leaked stuff (Torrent) : https://anonfiles.com/13h0S3Kbx6/NVIDIA_LEAKS_PARTONE_TORRENT
Magnet Link:
Code:
magnet:?xt=urn:btih:DC718539145BDE27DDDB5E94C67949E6D1C8513C&dn=integdev_gpu_drv.rar&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce
Last edited: