Connect with us
Nvidia hacked by hackers Nvidia hacked by hackers

Security

Nvidia hacked by hackers

Published

on

According to threads, Nvidia’s internal network has been hacked and several key systems such as email and developer tools have been down for the past few days. According to the CRN website, Nvidia is investigating the “incident” and its response to CRN’s request said: “Our business and commercial activities continue uninterrupted. We are still working on assessing the nature and scope of the event and do not have additional information at this time.”

Interestingly, documents filed by Nvidia with regulators back in October 2021 contain a warning about a possible attack on the company in the future, addressed to shareholders. At the time, the company said it was difficult to defend against attacks as they were becoming more “widespread and sophisticated.” The document goes on to say: “Our efforts to prevent and overcome these and similar problems may increase our costs and may not be successful. We may experience interruptions, delays, service interruptions and the loss of existing or potential customers.”

Nvidia hacked by hackers

There is no exact information about who attacked Nvidia and for what purpose. According to some reports, a South American ransomware group called LAPSU$ is behind the hack. According to the published screenshots, as a result of the hack, the group stole about 1 TB of data from Nvidia. In response, Nvidia allegedly hacked LAPSU$ and encrypted the stolen data, but LAPSU$ kept a backup copy.

.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

It turned out that even a turned off iPhone can be hacked

Published

on

It turned out that even a turned off iPhone can

Researchers at the Technical University of Darmstadt in Germany have found that the iPhone can be at risk even when turned off.

When iPhone is turned off, most wireless chips, including Bluetooth, NFC, and Ultra-Wideband (UWB), continue to work for up to 24 hours. So the phone can still be found through Find My and you can still access credit cards and digital keys. These wireless chips have direct access to the secure element and can be used to install malware on the iPhone even when iOS is down.

Wireless chips operate in low power mode (Low-Power Mode, LPM). This is not to be confused with Power Saving Mode, which extends battery life. LPM support is implemented in hardware, which means that this issue cannot be fixed with a software-side fix.

It turned out that even a turned off iPhone can be hacked

Researchers conducted a security analysis of the LPM features introduced in iOS 15 and found that the Bluetooth LPM firmware could be modified to run malware on the iPhone. These loopholes have not been previously considered and could allow hackers with system-level access to track someone’s location or trigger new features on the phone. The problem seems to stem from the fact that LPM features were designed with functionality in mind, and there seemed to be little attention given to possible threats outside of the intended applications.

Disabling Find My turns turned off iPhones into tracking devices, and the implementation in the Bluetooth firmware is not immune to manipulation. Tracking properties can be surreptitiously modified by attackers with system-level access.

Ars Technica notes that most iPhone users have nothing to worry about, since a jailbroken iPhone is required to infect third-party software. However, the security hole can be exploited by spyware such as Pegasus.

The results of the research were transferred to Apple, which did not comment on the situation.

Continue Reading

Components

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining. Nvidia LHR v3 security cracked 90%

Published

on

The GeForce RTX 3050 can now also be almost fully

A couple of weeks ago, the LHR protection in Nvidia graphics cards was cracked, which allowed everyone to use accelerators for Ethereum mining at full capacity again. But in fact, then the protection of LHR v2 was cracked, but not LHR v3.

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining.  Nvidia LHR v3 security cracked 90%

The LHR v3 version is present in Nvidia’s latest releases: RTX 3050 and RTX 3080 12GB. And it is still not completely hacked, but now the NiceHash miner is able to use 90% of the performance of these cards when mining cryptocurrency. It’s not a complete hack yet, but it’s getting very close.

Fortunately, at the moment the cryptocurrency market is in a state of decline, so it hardly makes any sense to buy the same RTX 3050 for mining, which means that gamers need not worry for now.

By the way, a large article has been published on our website with an analysis of methods for cracking Nvidia protection.

Continue Reading

Security

Nvidia lost. LHR mining protection is also hacked under Linux. This was done by NBMiner developers

Published

on

Nvidia lost LHR mining protection is also hacked under

Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux.

Nvidia lost.  LHR mining protection is also hacked under Linux.  This was done by NBMiner developers

Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed source, so it’s not clear what mechanisms the developers used to hack.

Whether the loss of Nvidia will affect the availability and prices of video cards is still difficult to say. At the moment, the cryptocurrency market continues to fall, but sooner or later it will turn around, and gamers may again face shortages and overpriced graphics cards.

Continue Reading

Most Popular