Hacking Lapsus$: Ubisoft becomes the next target after NVIDIA and Samsung

Lapsus$ Hacking: Ubisoft Becomes the Next Target After Nvidia and Samsung

(Photo: FREDERIC J. BROWN/Getty Images)
Ubisoft admits to a cybersecurity incident that disrupted its internal systems. The group behind the hack is Lapsus$, the same group that hacked NVIDIA and Samsung.

Ubisoft admits to a cybersecurity incident that disrupted its internal systems. The group behind the hack is Lapsus$, the same ransomware gang that hacked NVIDIA and Samsung.

Ubisoft reported that its players’ personal information was not exposed in the hack.

Ubisoft hack

According to The edge, Ubisoft released a statement indicating that its system experienced a cybersecurity incident. Ubisoft is a French video game company, popularly known as the creators of Far Cry, Watch Dogs and Assassin’s Creed.

On Thursday, March 11, the company reported that the breach temporarily affected many games, features, and services in their internal systems.

Ubisoft didn’t mention any other information about how it happened and who was behind the hack in the statement they released.

For a few hours, no group suddenly came forward acknowledging the hack and asking for claims.

However, hacking group Lapsus$ hinted that it could have caused the cybersecurity incident.

Ubisoft assured his audience that his IT team, along with leading external experts, was reviewing the hack and investigating vulnerabilities. Ubisoft has assured its players that all of its games and services are working and fully operational.

However, for additional security measures, the company encourages its users to reset the site-wide password.

The company added that at this time there is no evidence proving that any player’s personal information was compromised and exposed as a byproduct of this cybersecurity incident.

Lapsus$ came into the public eye quite recently after making a massive dent in NVIDIA and Samsung.

Nvidia hack

Lapsus$ made a name for itself by hacking NVIDIA, an American technological multinational. Gamers, artists, and crypto miners generally know this company as one of the best in creating graphics processing units.

Lapsus$ hacked into NVIDIA’s system on February 28. The group allegedly managed to steal 1TB of information from the tech giant.

It has been revealed by NVIDIA that the company is aware that the threat actors have obtained sensitive information such as employee credentials and proprietary information from the company’s computer system.

The hack took place a day before the political assault in Russia and Ukraine. Many people thought this was somehow correlated to the aggression in Eastern Europe. However, NVIDIA clarified that it had nothing to do with it.

NVIDIA also added that they were aware of the hack that took place and took steps to counter the breach in their systems, although their efforts were deemed unsuccessful.

The reason for the $lipsus attack against NVIDIA is that they want to help the gaming and mining community by calling on NVIDIA to release an update for all GeForce RTX 30 Series firmware which will remove all restrictions placed on the cards by the society.

Read also: Anonymous continues to hack Russia and targets streaming services

Samsung hack

Ubisoft and NVIDIA are not the only companies compromised by the cyber group, Lapsus$ also hacked Samsung.

After the group hacked NVIDIA, the second company they tracked was South Korean tech giant Samsung. Lapsus$ leaked a total of 190 GB of Samsung data and made it available to the public via a free downloadable torrent.

The ransomware gang was able to infiltrate Samsung’s TrustZone environment used for sensitive operations and leaked the following data and source code:

  • Algorithms that will be used for all biometric unlock operations.
  • The source code for the bootloader on all recent Samsung devices can be found here.
  • Confidential source code provided by Qualcomm.
  • The source code of Samsung’s activation servers.
  • Complete source code of the technology used to authorize and authenticate Samsung accounts, as well as APIs and other services

The breach was able to collect multiple Samsung Github repositories, including “Mobile Defense Engineering, Samsung Account Backend, Samsung Pass Backend/Frontend, and SES (Bixby, Smartthings, Store),” according to reports.

Related article: Lapsus$ group leaks alleged confidential Samsung data