NVIDIA Databreach

Celebrate Nite

Come On Baby It's Party Time!
kiwifarms.net
Joined
Jan 2, 2020
Genuinely surprised there wasn't a topic for this aside from the leak that happened last year

Article: https://securityaffairs.co/wordpress/128573/data-breach/nvidia-data-breach.html
Archive: https://archive.md/G1N2p
The chipmaker giant Nvidia was recently the victim of a cyber attack that impacted some of its systems for two days. The security breach is not connected to the ongoing crisis in Ukraine, according to a person familiar with the incident.

The incident also impacted the company’s developer tools and email systems, but business and commercial activities were not affected.


“Our business and commercial activities continue uninterrupted,” Nvidia said in a statement. “We are still working to evaluate the nature and scope of the event and don’t have any additional information to share at this time.”


The Lapsus$ ransomware gang is claiming responsibility for this attack, the group announced to have stolen 1 TB of data from Nvidia’s network. The ransomware gang leaked online around 20GB of data, including credentials for all Nvidia employees.


The company launched an investigation into the incident to determine the extent of the intrusion that confirmed that the attackers have stolen data from the chipmaker.


NVIDIA said employee credentials and proprietary information were stolen during a cyberattack they announced on Friday.


The chipmaker giant discovered the intrusion on February 23, the attack also impacted its IT resources.


“Access to NVIDIA employee VPN requires the PC to be enrolled in MDM (Mobile Device Management). With this they were able to connect to a [virtual machine] we use. Yes they successfully encrypted the data,” the group claimed in a subsequent message.” the LAPSU$ ransomware gang wrote on its Telegram change. “However we have a backup and it’s safe from scum! We are not hacked by a competitors groups or any sorts.”

Below is the statement shared by NVIDIA with some websites and published by BleepingComputer.


“On February 23, 2022, NVIDIA became aware of a cybersecurity incident which impacted IT resources. Shortly after discovering the incident, we further hardened our network, engaged cybersecurity incident response experts, and notified law enforcement.” reads the statement. “We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Russia-Ukraine conflict. However, we are aware that the threat actor took employee credentials and some NVIDIA proprietary information from our systems and has begun leaking it online. Our team is working to analyze that information. We do not anticipate any disruption to our business or our ability to serve our customers as a result of the incident.”
Article: https://www.guru3d.com/news-story/n...gets-more-serioushackers-make-new-demand.html Archive: https://archive.md/0hppv
The aftermath of the NVIDIA breach is slowly disclosing more and more info about pending products. Yesterday an older version of DLSS source code was already spotted, new GPU architectures have been confirmed as in Blackwell, Hopper and Ada Lovelace. And today the number of streaming multiprocessors of Ampere successors.

Twitter user La Frite David, has reviewed the data that has leaked thus far, and it specifies the number of streaming multiprocessors in the Ampere successors, among other things. This allows the number of shader cores to be calculated. The highest model, AD102, is expected to have up to 144 SMS or 18,432 cores, which corresponds to a claim made by the end of 2020. Furthermore, AD103, AD104, AD106, and AD107 are examined, with their claimed specifications listed below.

AmpereAda Lovelace
GPUSMx128Shader coresGPUSMx128Shader cores
1028410.75210214418.432
103S607.6801038410.752
104486.144104607.680
106303.840106364.608
107202.560107243.072

The hacking team now threatened to leak all data if Nvidia does not remove the hash rate restriction on RTX 30-series LHR devices. Also, they're advancing and are demanding that Nvidia totally open-sources its GPU drivers for Windows, macOS, and Linux. If the corporation violates this, Lapsus$ will publish not only chipset data but also information about the present and forthcoming GPUs.
NVIDIA Data Breach Aftermath Gets more serious, hackers make new demand.png
NVIDIA data breach exposed credentials of over 71,000 employees.png

Download of leaked stuff (Torrent) : https://anonfiles.com/13h0S3Kbx6/NVIDIA_LEAKS_PARTONE_TORRENT
Magnet Link:
Code:
magnet:?xt=urn:btih:DC718539145BDE27DDDB5E94C67949E6D1C8513C&dn=integdev_gpu_drv.rar&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce
 
Last edited:
Gigabyte suffered a massive data breach earlier this year, I imagine this is somewhat connected.

Gigabyte naturally had some proprietary Nvidia data, so I guess they got chink’d
 
The torrent shows up as invalid for me (using the Transmission client)
 
The torrent shows up as invalid for me (using the Transmission client)
Try this magnet link:
Code:
magnet:?xt=urn:btih:DC718539145BDE27DDDB5E94C67949E6D1C8513C&dn=integdev_gpu_drv.rar&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce

I tested it myself (using transmission as well) and it seems to work better. I'll add it to the OP too
 
  • Winner
Reactions: Kosher Dill
That's pretty silly. All NVIDIA has to do is pretend to comply while dragging their feet long enough to hire some blackhats of their own to find these clowns. What're they gonna do, audit NVIDIA for open-source compliance for the rest of their lives using the same cache of verilog files as an instrument of their compliance?
 
They'd be fools if they did- big as the databreach may be, it is still finite damage compared to complying with these dipshit hacktivist's demands.
What route do companies generally pursue with situations like this?
 
At least we got Intel as the other big GPU market player.
Edit: Isn't pop os and manjaro enough for linux gamer bois?
 
What route do companies generally pursue with situations like this?
From what I understand, most don't pay the ransom and instead focus on cleanup, recovery, and network hardening. If you pay the ransom, you have absolutely no guarantee of getting your data back and you encourage other outfits to try shaking you down for some bitcoin lunch money again and again. If the attackers were careless enough to leave behind digital forensics (usually the case with script kiddies or hacktivists, think Aubrey "Kirtaner" Cottle), these are preserved for later so that an outside party can hunt the little pricks down. If they manage to identify the attackers, most companies let law enforcement take it from there. I've occasionally heard of some instead hiring a wetworks man to put a bullet in their skulls, but since I could never get specifics on any of that it may have just been somebody bullshitting (or seeing connections that weren't there, people can get blown away doing something scummy but unrelated, it happens).
 
  • Informative
Reactions: AMHOLIO
If they have what they say they have, such as the Verilog files, the damage to NVIDIA is incalculable. I would imagine it is on the order of billions.
AMD, Intel, Qualcomm and others won't lift anything proprietary from them, for fear of lawsuits(just look at previous squabbles between anyone making graphic chips) and TSMC and Samsung will not manufacture the chips for the obvious chink GPUs.
Even if they managed to get it made the import and sale of those products would be banned. In my opinion releasing the Verilog files is more of a tremendous embarrassment for Nvidia, like if someone hacked and plastered a dudes dick pics everywhere. Again, that's just my opinion and I don't know shit.
 
Back