Social Engineering Rises: Cyberattacks on Nvidia, Samsung, and Others

By Madata

User on laptop entering login credentials
"Listen to audio version"
3:49

Technology companies have become dominant players in the market; they have allowed us to be present in meetings from anywhere and take us from one point to another with just a few clicks on our devices. So many users using these technologies should receive protection for their personal data. Unfortunately, this is not the case. We tell you about 4 cyberattacks that have occurred so far this year by the same group of cybercriminals.

4 Companies Attacked by the Same Group of Hackers Using Social Engineering: LAPSUS$

Let's define the concept of Social Engineering: In the context of digital security, it manipulates users to obtain confidential information. An example of this practice is using the “forgotten password” feature on login-enabled websites. A system that can grant a malicious attacker full access to a user's account, while the original user will lose access to the account.

Now, with a brief explanation of this type of attack, we will understand how the group calling itself LAPSUS$ successfully carried it out in 2022. 

NVIDIA

A multinational company that primarily develops graphics processing units and integrated circuit technologies. 

In late February, the hacker group Lapsus$ attacked the company, publishing almost 1TB of company information. Information that included employee passwords and confidential information about future products. 

SAMSUNG

Samsung also suffered a cyberattack by the Lapsus$ group at the end of July. The cybercriminals made public confidential company data, source code for some apps, and security services used on Galaxy phones.  

Although the attack did not include its users' social security or credit/debit card numbers, their names, dates of birth, product registration, and demographic and contact information did.

This attack led the company to hire an external cybersecurity firm to increase and strengthen its digital security. 

UBER

We continue with the cyber attack allegedly caused by Lapsus$. Uber is not 100% sure, but it accuses the group of teenage hackers since their techniques are similar (social engineering). In 2022 alone, they have attacked Microsoft, Cisco, Nvidia, and Samsung.

It all happened this past September 15, when The New York Times reported that the attack was carried out through social engineering against a high-profile employee, compromising access to his communications service account, Slack. 

From this access, the attacker was able to access several employee accounts, which gave him elevated permissions to several tools, such as G-Suite and Slack. 

Uber continues investigating what happened, working with several leading digital forensic firms in the sector to strengthen its digital security. 

ROCKSTAR GAMES

The last one on our list was also made in September by the same hacker, who uses the name “teapotuberhacker” and is 17 years old. 

This cybercriminal leaked over 90 videos of the video game Grand Theft Auto VI by Rockstar Games. 

Learn about other cyberattacks carried out on governments - Would you put the negotiation of a trade agreement at risk? Or any political situation of your government?

This is how the year 2022 has been a year of increased cyberattacks. Through different techniques, criminals continue to affect all types of companies. This is why investing in our companies' cybersecurity has stopped being a luxury and has become a necessity.

We invite you to learn about our Cybersecurity service in Madata and receive a free consultation to determine your degree of vulnerability and learn how to strengthen yourself against any type of digital attack. 

Write to us at contacto@madata.com

Next Post

    Latest Posts

    A lock and shield with internet and cloud symbols.

    10 Cybersecurity Best Practices For Businesses

    Read Full Post
     Cloud on a tablet with different icons

    Best Cloud Hosting Providers for Texas

    Read Full Post
    Holding out hand with a cloud symbol and a computer.

    What Are the Benefits and Risks of Cloud Hosting?

    Read Full Post
    SAP on virtual screen SAP software meaning.

    What is SAP Software and How to Use it For Your Business

    Read Full Post
    image

    Subscribe To Receive The Latest News

    Similar Posts

    By Madata  |  Nov 21 2023

    IT Managers: IT Spending Best Practices by Gartner

    Success in cost optimization depends on taking a strategic approach. IT leaders seek to maximize sav...

    By Madata  |  Nov 28 2023

    Optimizing Resources: Economic Efficiency of Cybersecurity

    Next Friday, November 30, we celebrate "International Computer Security Day"! On this special occasi...

    By Madata  |  Jan 31 2023

    The path to EaaS: Everything-as-a-Service

    The hybrid combination of infrastructure and IT services will rule companies for years to come. Find...