Hackers gained access to a technological company's network and took its data.

According to evidence circulating on the internet, South American hackers from the Lapsus group gained access to information about Nvidia employees, but they made one critical error in the process...

A recent cyberattack on the American corporation Nvidia resulted in the theft of up to 1TB of data, which included personal information about employees, codes for their computers, and other sensitive information. It is believed that the attack was carried out by South American hackers from the group Lapsus $, who threatened Nvidia that if they did not pay a ransom, the information would be made public.

The corporation stated to the media at the end of last week that it was looking into the problem, but did not provide any other information regarding the attack itself, the stolen data, or the ransom demanded. Of course, their security professionals responded swiftly to the attack, and interesting information regarding the situation's continued evolution emerged just a few days later.

To be more specific, it appears that the hackers from Lapsus $ made a grave error by leaving one of their virtual PCs running in Nvidia's device management software. That enabled Nvidia's experts to successfully hack hackers, which was previously impossible. According to a story published on TechSpot, they were able to remotely encrypt the stolen data and prevent hackers from gaining access to Nvidia's computer network. However, it is possible that this will not help them preserve the stolen data because the hackers have already made a copy of it, according to reports.

Rumors circulating on the network claim that the hackers, in retaliation for being hacked by Nvidia, have already disclosed this information on the Telegram messaging app, although this information has not been confirmed by the company. According to media sources, if that's the case, Nvidia appears to have had plenty of time to modify the data on usernames and passwords that hackers had devised before the breach occurred.


Gent Flori

105 Blog posts

Comments