Samsung has confirmed that the firm is hit by a security breach which has resulted in the exposure of internal company data, including the source code of its Galaxy Smartphones.
“According to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices, but does not include the personal information of our consumers or employees,” Samsung told Bloomberg.
The LAPSUS$ hacking group has leaked the breached data into a Telegram channel which confirmed the data breach publicly.
This Samsung data breach exposed the source code for trusted applets installed within TrustZone, biometrics authentication, confidential data from Qualcomm’s chip, source code for Samsung’s activation servers, full source code used for authenticating Samsung accounts, including services/APIs, and boot-loaders for recent devices.
LAPSUS$ hackers is also become recently popular for their breach on NVIDIA data breach that got away with 1TB trove of proprietary data including employee name, credentials, schematics, driver source code and other details related to latest graphic chips. The LAPSUS$ group was first seen in December 2021, and demanded NVIDIA to open-source its GPU drivers and remove Ethereum cryptocurrency mining cap from the Graphic card manufacturer’s 30-series GPUs.
The demands for Samsung data breach is not known yet but researchers predict it could be around similar lines.
LAPSUS$ has classified the stolen data into three compressed files that counts a totla of 190GB and it is published in a torrent for popularity, and is now shared by more than 400 peers actively. LAPSUS$ is also in process of including more severs to increase the download speed.
The classification of the Samsung data breach information is as follows,
The South Korean company has confirmed that the data breach doesn’t affect its business and customers. They have also implemented appropriate measures to prevent such breaches in future.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…