Samsung the next Victim of Data Theft after Nvidia as Hackers leak 190 GB Data
Reading Time: 2 minutes

Samsung is the latest victim of data theft after Nvidia, the hackers leaked 190GB of alleged Samsung data. Hackers claim the compromised data includes Samsung’s source code and other confidential information.

Earlier the Lapsus hacking group compromised confidential data including source code from Nvidia GPU designer. Now the hacking group claims to have leaked a huge collection of confidential data from Samsung Electronics, the South Korean giant consumer electronics company.

Samsung Victim of Data Theft
The news of the South Korean electronic manufacturer being hacked came to light after the hackers posted a note on Friday threatening to release Samsung data with a snapshot of C/C++ directives in Samsung software.

This was followed up with the Lapsus hacking group publishing about the upcoming leak which contained “confidential Samsung source code” originating from a breach.

The other details included were as follows:

  • source code for every Trusted Applet (TA) installed in Samsung’s TrustZone environment used for sensitive operations (e.g. hardware cryptography, binary encryption, access control)
  • algorithms for all biometric unlock operations
  • bootloader source code for all recent Samsung devices
  • confidential source code from Qualcomm
  • source code for Samsung’s activation servers
  • full source code for technology used for authorizing and authenticating Samsung accounts, including APIs and services

Samsung will have to face a huge amount of damage as a result of what looks like a major data breach, in case the information given above is accurate. 

The leaked data is split into three compressed files by Lapsus hacking group which adds up to 190GB and is available in a highly popular torrent with more than 400 peers sharing the content. Further, the hacking group added it will deploy more servers to increase the download speed.

The compressed files hosted on the servers include:

  • Part 1 contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items
  • Part 2 contains a dump of source code and related data about device security and encryption
  • Part 3 contains various repositories from Samsung Github: mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby, Smartthings, store)

We are not sure if the hacking group has yet contacted Samsung for a ransom at the time of writing. Stay tuned with us to hear more on this matter and don’t forget to leave a comment in the section below.

Related Articles:
Microsoft Discovered FoxBlade Malware Hit Ukraine Hours Before Russian Invasion
14 Toyota Plants Shut Down As A Result of Cyberattack
Daxin Malware – CISA discovers China-linked Malware that targets Secure Networks of Multiple Governments