The tech giant Samsung was targeted by LAPSUS$ hacking group whto steal almost 200GB of sensitive data in March 2022.
The exposed 190GB files included the source code for Samsung’s activation servers, bootloaders and biometric unlock algorithms for all recently released Samsung devices, and trusted applets for Samsung’s TrustZone environment.
The hacker also published the data on their telegram group and made it available for users to download it for free.
Source: https://www.itpro.co.uk/security/data-breaches/365022/samsung-hack-190gb-source-code-data
TPRM report: https://scoringcyber.rankiteo.com/company/samsung-electronics
"id": "sam211923922",
"linkid": "samsung-electronics",
"type": "Breach",
"date": "03/2022",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of a geographical region"
{'affected_entities': [{'industry': 'Technology',
'name': 'Samsung',
'type': 'Tech Giant'}],
'attack_vector': 'Hacking',
'data_breach': {'data_exfiltration': 'Yes',
'sensitivity_of_data': 'High',
'type_of_data_compromised': ['Source Code',
'Activation Servers',
'Bootloaders',
'Biometric Unlock Algorithms',
'Trusted Applets']},
'date_detected': 'March 2022',
'description': 'The tech giant Samsung was targeted by LAPSUS$ hacking group '
'to steal almost 200GB of sensitive data in March 2022. The '
'exposed 190GB files included the source code for Samsung’s '
'activation servers, bootloaders and biometric unlock '
'algorithms for all recently released Samsung devices, and '
'trusted applets for Samsung’s TrustZone environment. The '
'hacker also published the data on their telegram group and '
'made it available for users to download it for free.',
'impact': {'data_compromised': '190GB',
'systems_affected': ['Activation Servers',
'Bootloaders',
'Biometric Unlock Algorithms',
'TrustZone Environment']},
'motivation': ['Data Theft', 'Public Disclosure'],
'threat_actor': 'LAPSUS$',
'title': 'Samsung Data Breach by LAPSUS$',
'type': 'Data Breach'}