Last Updated on 04/03/2022 by Nidhi Khandelwal
network had been infiltrated as a result of a cyber attack, giving the attackers access to sensitive material, including source code supposedly related to its Deep Learning Super Sampling (DLSS) technology.
In a security advisory, the company stated, “We have no indication of ransomware being distributed on the NVIDIA environment or that this is tied to the Russia-Ukraine conflict.” “However, we are aware that the threat actor has begun exposing employee passwords and certain NVIDIA confidential material from our systems online.”
February 23, with the corporation stating that it has taken steps to evaluate the exposed data and that all of its employees have been ordered to change their passwords immediately.
The news comes only days after The Telegraph revealed last week that the company is probing a possible cyber attack that knocked “parts of its operations offline for two days.” Bloomberg later reported, citing a “source familiar with the situation,” that the breach was a modest ransomware attack.
Furthermore, the group claimed that NVIDIA had hacked back and encrypted the stolen data with ransomware, adding that the contents were eventually recovered from a backup.
The invaders then changed their demands, requesting that NVIDIA deliver a software update that disables the Lite Hash Rate (LHR) technology in its graphics cards, which is designed to reduce Ethereum mining rates by 50% and discourage cryptocurrency miners from purchasing gaming-focused GPUs.
We demand that NVIDIA pledges to entirely open-source (and share under a FOSS licence) its GPU drivers for Windows, macOS, and Linux, from now on and forever,” the crooks wrote on Telegram, threatening future leaks and proposing a $1 million LHR bypass tool.
NVIDIA, on the other hand, is unfazed by the events. “As a result of the event, we do not anticipate any disruption to our business or our ability to service our clients,” the company stated in a statement.