Hackers leak 190GB of alleged Samsung details, source code
2 min read
The Lapsus$ information extortion team leaked right now a huge assortment of private facts they assert to be from Samsung Electronics, the South Korean huge buyer electronics corporation.
The leak arrives significantly less than a 7 days immediately after Lapsus$ unveiled a 20GB doc archive from 1TB of facts stolen from Nvidia GPU designer.
Gang teases Samsung details leak
In a take note posted earlier now, the extortion gang teased about releasing Samsung knowledge with a snapshot of C/C++ directives in Samsung software package.
Shortly following teasing their followers, Lapsus$ posted a description of the future leak, declaring that it contains “confidential Samsung supply code” originating from a breach.
- supply code for each and every Trusted Applet (TA) put in in Samsung’s TrustZone setting utilized for sensitive operations (e.g. hardware cryptography, binary encryption, obtain control)
- algorithms for all biometric unlock operations
- bootloader supply code for all modern Samsung products
- private resource code from Qualcomm
- source code for Samsung’s activation servers
- comprehensive supply code for engineering utilized for authorizing and authenticating Samsung accounts, like APIs and companies
If the particulars previously mentioned are exact, Samsung has suffered a significant information breach that could cause large harm to the corporation.
Lapsus$ split the leaked knowledge in a few compressed documents that include to nearly 190GB and designed them offered in a torrent that seems to be remarkably well known, with far more than 400 peers sharing the material. The extortion team also explained that it would deploy additional servers to maximize the down load pace.
Integrated in the torrent is also a temporary description for the content available in each and every of the a few archives:
- Component 1 has a dump of supply code and associated knowledge about Security/Defense/Knox/Bootloader/TrustedApps and numerous other items
- Portion 2 contains a dump of supply code and relevant facts about unit safety and encryption
- Part 3 contains various repositories from Samsung Github: mobile protection engineering, Samsung account backend, Samsung move backend/frontend, and SES (Bixby, Smartthings, retailer)
It is unclear if Lapsus$ contacted Samsung for a ransom, as they claimed in the case of Nvidia.
BleepingComputer has contacted Samsung for a statement about the Lapsus$ information leak and will update the posting when the company replies.
Update [March 7, 2022]: Samsung confirmed a information breach on its methods and that the intruder experienced access to resource code utilized in Galaxy smartphones.