{"id":18506,"date":"2022-03-15T10:45:12","date_gmt":"2022-03-15T18:45:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/15\/news-12239\/"},"modified":"2022-03-15T10:45:12","modified_gmt":"2022-03-15T18:45:12","slug":"news-12239","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/15\/news-12239\/","title":{"rendered":"The Lapsus$ Hacking Group Is Off to a Chaotic Start"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62294a44e9f8d17d4c9f815b\/master\/pass\/Lapsus$%20Extortion%20Group-Security.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 15 Mar 2022 17:04:04 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Ransomware gangs have<\/span> <a href=\"https:\/\/www.wired.com\/story\/ransomware-gone-corporate-darkside-where-will-it-end\/\">become well-oiled moneymaking machines<\/a> in their quest for criminal profit. But since December, a seemingly new group called Lapsus$ has added chaotic energy to the field, cavorting about with a strong social media presence on <a href=\"https:\/\/www.wired.com\/story\/how-telegram-became-anti-facebook\/\">Telegram<\/a>, a string of high-profile victims\u2014including Samsung, Nvidia, and Ubisoft\u2014calamitous leaks, and dramatic accusations that add up to a reckless escalation in <a href=\"https:\/\/www.wired.com\/story\/ransomware-2020-headed-down-dire-path\/\">an already unlawful industry<\/a>.<\/p>\n<p class=\"paywall\">What makes Lapsus$ noteworthy, too, is that the group isn&#x27;t really a ransomware gang. Instead of exfiltrating data, encrypting target systems, and then <a href=\"https:\/\/www.wired.com\/story\/apple-ransomware-attack-quanta-computer\/\">threatening to leak the stolen information<\/a> unless the victim pays up, Lapsus$ seems to exclusively focus on the data theft and extortion. The group gains access to victims through phishing attacks, then steals the most sensitive data it can find without deploying data-encrypting malware.<\/p>\n<p class=\"paywall\">\u201cIt\u2019s all been quite erratic and unusual,\u201d says Brett Callow, a threat analyst at the antivirus company Emsisoft. \u201cMy sense is that they are a talented but inexperienced operation. Whether they will seek to expand and bring on affiliates or keep it small and lean remains to be seen.\u201d<\/p>\n<p class=\"paywall\">Lapsus$ emerged just a few months ago, at first focused almost exclusively on Portuguese-language targets. In December and January, the group hacked and attempted to extort Brazil\u2019s health ministry, the Portuguese media giant Impresa, the South American telecoms Claro and Embratel, and Brazilian car rental company Localiza, among others. In some cases, Lapsus$ also mounted denial-of-service attacks against victims, making their sites and services unavailable for a period of time.\u00a0<\/p>\n<p class=\"paywall\">Even in those early campaigns, Lapsus$ got creative; it set Localiza&#x27;s website to redirect to an adult media site for a couple of hours until the company could revert it.\u00a0<\/p>\n<p class=\"paywall\">As the attackers have ramped up and gained confidence, they&#x27;ve expanded their reach. In recent weeks, the group has hit Argentine ecommerce platforms MercadoLibre and MercadoPago, claims to have breached the British telecom Vodafone, and has begun leaking sensitive and valuable source code from Samsung and Nvidia.\u00a0<\/p>\n<p class=\"paywall\">\u201cRemember: The only goal is money, our reasons are not political,\u201d Lapsus$ wrote in its Telegram channel in early December. And when the group announced its Nvidia breach on Telegram at the end of February, it added, \u201cPlease note: We are not state sponsored and we are not in politics AT ALL.\u201d<\/p>\n<p class=\"paywall\">Researchers say, though, that the truth about the gang&#x27;s intentions are more murky. Unlike many of the most <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">prolific ransomware groups<\/a>, Lapsus$ seems to be more of a loose collective than a disciplined, corporatized operation. \u201cAt this point it&#x27;s difficult to say with certainty what the group\u2019s motivations are,\u201d says Xue Yin Peh, a senior cyber-threat intelligence analyst at the security firm Digital Shadows. \u201cThere are no indications yet that the group uses ransomware to extort victims, so we can\u2019t confirm that they\u2019re financially motivated.\u201d<\/p>\n<p class=\"paywall\">\u201cThis group operates on street cred and clout.\u201d<\/p>\n<p class=\"paywall\">Charles Carmakal, Mandiant<\/p>\n<p class=\"paywall\">Lapsus$ breached Nvidia in mid-February, stealing 1 terabyte of data, including a significant amount of sensitive information about the designs of Nvidia graphics cards, source code for an Nvidia AI rendering system called DLSS, and the usernames and passwords of more than 71,000 Nvidia employees. The group threatened to release more and more data if Nvidia didn&#x27;t meet a series of unusual demands. At first the gang told the chipmaker to remove an anti-crypto-mining feature called Lite Hash Rate from its GPUs. Then Lapsus$ demanded that the company release certain drivers for its chips.<\/p>\n<p class=\"paywall\">\u201cThe focus on cryptocurrency mining suggests that the group may ultimately be financially driven, however they are certainly taking a different approach than other groups in soliciting financial rewards,\u201d Digital Shadows&#x27; Peh says.<\/p>\n<p class=\"paywall\">In a tumultuous turn, Lapsus$ also accused Nvidia of \u201chacking back\u201d\u2014lashing out against the group in retaliation for the attacks. A source close to the Nvidia incident disputed the claims, though, telling WIRED that the company did not hack back or deploy malware against Lapsus$.<\/p>\n<p class=\"paywall\">\u201cIt&#x27;s difficult to say. The only source we&#x27;ve had for it is the ransomware group themselves,\u201d says independent security researcher Bill Demirkapi of the claims. \u201cThe explanation they gave for how Nvidia hacked back does make sense, but I always take such statements with a grain of salt, because Lapsus$ has an incentive to make Nvidia look as bad as possible.\u201d<\/p>\n<p class=\"paywall\">Nvidia said in a statement that it learned about the breach on February 23 and quickly \u201cfurther hardened our network, engaged cybersecurity incident response experts, and notified law enforcement.\u201d The company acknowledged that the attackers stole employee authentication credentials and some proprietary data.<\/p>\n<p class=\"paywall\">In a blithe, even rash move, Lapsus$ also included two sensitive Nvidia code-signing certificates in its leaks. Other attackers quickly abused them to make their malware look more authentic and trustworthy in certain scenarios.\u00a0<\/p>\n<p class=\"paywall\">\u201cThis group operates on street cred and clout,\u201d says Charles Carmakal, senior vice president and chief technical officer of the cybersecurity firm Mandiant. \u201cThey&#x27;re bragging to their friends, and if they get money, they&#x27;ll take it, but money doesn&#x27;t seem to be the sole or even primary driver. So a victim company that wants to negotiate with them and may think about paying them likely won\u2019t get the outcome they\u2019re hoping for.\u201d<\/p>\n<p class=\"paywall\">That thirst for notoriety makes Lapsus$ particularly reckless and disruptive. While they don\u2019t encrypt systems, Lapsus$ has deleted files and virtual machines, and generally caused \u201ca whole lot of chaos,\u201d as Carmakal puts it.<\/p>\n<p class=\"paywall\">Just a few days after it began leaking Nvidia data, Lapsus$ also announced that it had stolen 190 gigabytes of data from Samsung, including boot-loader source code and algorithms for the Galaxy smartphone line&#x27;s biometric authentication system. Samsung <a data-offer-url=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-03-07\/samsung-says-hackers-breached-company-data-galaxy-source-code\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bloomberg.com\/news\/articles\/2022-03-07\/samsung-says-hackers-breached-company-data-galaxy-source-code&quot;}\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-03-07\/samsung-says-hackers-breached-company-data-galaxy-source-code\" rel=\"nofollow noopener\" target=\"_blank\">confirmed<\/a> last week that it suffered a breach.<\/p>\n<p class=\"paywall\">A few days later, Ubisoft joined the fray. \u201cLast week, Ubisoft experienced a cyber security incident that caused temporary disruption to some of our games, systems, and services,&quot; the company wrote in a <a data-offer-url=\"https:\/\/news.ubisoft.com\/en-gb\/article\/3tSsBh25mhHhlbGSy1xbRw\/ubisoft-cyber-security-incident-update?utm_source=narrativ\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.ubisoft.com\/en-gb\/article\/3tSsBh25mhHhlbGSy1xbRw\/ubisoft-cyber-security-incident-update?utm_source=narrativ&quot;}\" href=\"https:\/\/news.ubisoft.com\/en-gb\/article\/3tSsBh25mhHhlbGSy1xbRw\/ubisoft-cyber-security-incident-update?utm_source=narrativ\" rel=\"nofollow noopener\" target=\"_blank\">statement<\/a> on Thursday. \u201cAs a precautionary measure we initiated a company-wide password reset \u2026 There is no evidence any player personal information was accessed or exposed as a by-product of this incident.\u201d<\/p>\n<p class=\"paywall\">Specific details about the group remain scarce for now. Researchers suspect that Lapsus$ is based in South America, potentially in Brazil, and say it may have a few members in Europe as well, perhaps in Portugal. Lapsus$ doesn&#x27;t have a homepage on the dark web for posting samples of leaked data and negotiating with victims. Instead, in an unorthodox move for ransomware groups, the gang uses Telegram for most of its public-facing operations.<\/p>\n<p class=\"paywall\">\u201cOne unusual tendency of Lapsus$ is their use of Telegram to broadcast victims\u2019 identities,\u201d Digital Shadows&#x27; Peh says. \u201cAbusing a legitimate tool like Telegram ensures Lapsus$\u2019s data leak channel will see minimum disruption, and that their victims\u2019 identities can be exposed to anyone with an internet connection.\u201d<\/p>\n<p class=\"paywall\">One of Lapsus$&#x27;s trademark antics is to run polls on its Telegram channel where onlookers can vote for whose data the gang should publish next.<\/p>\n<p class=\"paywall\">\u201cIt\u2019s very reminiscent of the Lulzsec folks and even Anonymous back in the day,\u201d Mandiant&#x27;s Carmakal says of the two hacktivist collectives that rose to prominence in the early 2010s. \u201cThose folks had political motivations, or pretended to, but were also doing it for the fame and glory, and Lulzsec in particular was more overt about doing it for fun. With Lapsus$ it&#x27;s a very dangerous thing for people to do for fun, and they will be arrested at some point in time.\u201d<\/p>\n<p class=\"paywall\">In the meantime, though, the question for Big Tech is, who will be in Lapsus$&#x27;s crosshairs next? It seems that no target is too big or influential to be out of reach\u2014and that the demands may be just as hard to predict.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/lapsus-hacking-group-extortion-nvidia-samsung\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62294a44e9f8d17d4c9f815b\/master\/pass\/Lapsus$%20Extortion%20Group-Security.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 15 Mar 2022 17:04:04 +0000<\/strong><\/p>\n<p>Telegram polls. Unusual demands. The latest extortion gang is on an unorthodox rampage.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18506","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18506"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18506\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18506"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}