Fractal Design Pop Air RGB Black TG review
Palit GeForce GTX 1630 4GB Dual review
FSP Dagger Pro (850W PSU) review
Razer Leviathan V2 gaming soundbar review
Guru3D NVMe Thermal Test - the heatsink vs. performance
EnGenius ECW220S 2x2 Cloud Access Point review
Alphacool Eisbaer Aurora HPE 360 LCS cooler review
Noctua NH-D12L CPU Cooler Review
Silicon Power XPOWER XS70 1TB NVMe SSD Review
Hyte Y60 chassis review
Samsung Possibly Data Breached As Well
by
Hilbert Hagedoorn
on: 03/05/2022 02:46 PM | source: https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/ |
19 comment(s)
A massive amount of data purportedly from Samsung Electronics has been exposed online, reports BleepingComputer.
The breach comes shortly after the one from NVIDIA and comes from the very same team responsible for that attack, Lapsus$. The group hinted about revealing Samsung data with a screenshot of C/C++ instructions in Samsung software in a message issued earlier today. The source code for the bootloader on all contemporary Samsung smartphones would be posted and shared as well as source code for the technology used to authorize and authenticate Samsung accounts, including APIs and services.
Currently, 190GB of plausible Samsung data has leaked. Samsung has yet to respond.
« Silicon Power Announces DDR5 UDIMMs · Samsung Possibly Data Breached As Well
· AMD Ryzen Threadripper PRO 5000 Specifications Have Been Leaked »
Samsung LPDDR5X DRAM Has Been Certified for Use with Qualcomm's Snapdragon Mobile - 03/03/2022 10:12 AM
Samsung Electronics Co., Ltd., the world leader in advanced memory technology, today announced that Qualcomm Technologies, Inc. has validated Samsung's 14-nanometer (nm) based 16-gigabit (Gb) Low Pow...
Samsung Announces Galaxy Book2 Pro Series Laptops - 02/28/2022 09:44 AM
Galaxy Book2 Pro is a new line of high-end PCs from Samsung. It includes the Galaxy Book2 Pro 360 with S Pen functionality and the Galaxy Book2 Pro with 5G. Both sizes have the flexibility and versati...
Samsung high-end tablet Galaxy Tab S8 Ultra features a 14.6-inch 3K organic EL display. - 02/10/2022 10:02 AM
Samsung introduced the latest Android tablet Galaxy Tab S8 series at the new product announcement event "Galaxy Unpacked 2022." After February 25th, it will be available worldwide....
Samsung is experiencing production issues with its QD-OLED displays - 02/08/2022 09:40 AM
The manufacturing of Samsung's qd-oled screens appears to be difficult. According to TheElec sources in South Korea, the qd-oled display yield is approximately 30%. Connecting organic material to the...
Samsung Unveils the Exynos 2200 Processor with the Xclipse GPU Powered by AMD's RDNA2 Architecture - 01/18/2022 09:40 AM
Samsung announced its new premium mobile processor, the Exynos 2200. The Exynos 2200 is a freshly designed mobile processor with a powerful AMD RDNA 2 architecture based Samsung Xclipse graphics proc...
EspHack
Senior Member
Posts: 2731
Joined: 2010-01-03
Senior Member
Posts: 2731
Joined: 2010-01-03
#5998293 Posted on: 03/05/2022 04:03 PM
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
tsunami231
Senior Member
Posts: 12889
Joined: 2003-05-24
Senior Member
Posts: 12889
Joined: 2003-05-24
#5998323 Posted on: 03/05/2022 06:39 PM
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
it will stop when humanity ends
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
it will stop when humanity ends

DarkQuark
Senior Member
Posts: 145
Joined: 2004-10-17
Senior Member
Posts: 145
Joined: 2004-10-17
#5998365 Posted on: 03/05/2022 10:33 PM
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
That's exactly the sort of attitude that leads to such intrusions. Sure, sometimes companies get hacked due to poor security decisions but often time it's through social engineering or procedure weakness. In fact I would wager that when large entities get hit that is often times the case. But at the end of the day it all happens for a multitude of reasons and THAT'S why it can be difficult to prevent because there are many links in the chain. I would go so far as to say that overall diligence is more important than being the smartest security guy.
Just my take on it.
"but when will the hacking stop!?"
when the tech illiterate/negligent go extinct/bankrupt
That's exactly the sort of attitude that leads to such intrusions. Sure, sometimes companies get hacked due to poor security decisions but often time it's through social engineering or procedure weakness. In fact I would wager that when large entities get hit that is often times the case. But at the end of the day it all happens for a multitude of reasons and THAT'S why it can be difficult to prevent because there are many links in the chain. I would go so far as to say that overall diligence is more important than being the smartest security guy.
Just my take on it.
Venix
Senior Member
Posts: 2464
Joined: 2016-08-01
Senior Member
Posts: 2464
Joined: 2016-08-01
#5998371 Posted on: 03/05/2022 11:10 PM
People love entering locked places either by unlocking the locks .... Making duplicate keys or tricking people by allowing em in.... Or by bypassing the locks. And they will love to do that till the end of times it will always be the cat and mouse game. The reasons vary too a)because they can b) they like the challenge c) they have something to gain from it
People love entering locked places either by unlocking the locks .... Making duplicate keys or tricking people by allowing em in.... Or by bypassing the locks. And they will love to do that till the end of times it will always be the cat and mouse game. The reasons vary too a)because they can b) they like the challenge c) they have something to gain from it
Click here to post a comment for this news story on the message forum.
Senior Member
Posts: 13562
Joined: 2010-05-22
I wonder how much of that data needed to be outside air gapped security.
When it doesnt need to be accessible via network, hide it.
My point is, theres no guarantee of security on a network, safer working practices should be used if possible.
ie when network access will be needed, use a none automated network connection that is physically broken when not in use.
And those systems accessing it should be air gapped from the internet while in process.
The systems inside the boundary will alert when a connection is live so an accident is unlikely.
This could get complex quickly so new working practices will be required.
All other data should never be accessible on a network.