• Latest
  • Trending
Lapsus$: The New Name in Ransomware Gangs

Lapsus$: The New Name in Ransomware Gangs

March 16, 2022
Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 18 February, 2026
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Lapsus$: The New Name in Ransomware Gangs

by ITECHNEWS
March 16, 2022
in Leading Stories, Opinion
0 0
0
Lapsus$: The New Name in Ransomware Gangs
Lapsus$ arrives

According to The Record, the largest media conglomerate in Portugal, Impresa, was a target of the Lapsus$ ransomware over the New Year holiday break. Impresa owns the country’s largest TV channel and newspaper, SIC and Expresso. It was the Expresso Twitter account that the hackers used to bait the organization to demonstrate their control over the company’s IT infrastructure.

The group tweeted that “Lapsus$ is the new president of Portugal” – a melodramatic attempt to demonstrate the gang’s hold over the infrastructure of Portugal’s media organization.

YOU MAY ALSO LIKE

French Telco Orange Hit by Cyber-Attack

ATC Ghana supports Girls-In-ICT Program

Other targets include Brazil’s Ministry of Health (MoH) and Brazilian telecommunications operator Claro. The Brazilian MoH lost 50 TB of data in the attack. The gang also claimed to have deleted the data that held the information needed to issue Covid vaccination certificates.

However, the most advanced attacks were the ones targeting Nvidia and Samsung. In the case of Nvidia, the gang stole and leaked the credentials of more than 71,000 Nvidia employees, source code of Nvidia’s DLSS (Deep Learning Super Sampling) AI rendering technology and information about six supposed unannounced GPUs.

Officially Nvidia acknowledged that they became aware of a cyber security incident, which impacted IT resources. Lapsus$ demanded that Nvidia remove its lite hash rate (LHR) feature. The LHR was created to limit Ethereum mining capabilities in the NVidia RTX 30 series graphics cards, after the cryptomining community depleted the stock in early 2021. The group is also asking Nvidia to open source its GPU drivers for macOS, Windows, and Linux devices.

A few days later, Lapsus$ announced on its Telegram channel that it had breached Samsung and offered evidence including biometric authentication information and source code from both Samsung and one of its suppliers, Qualcomm.

Since they appear to be succeeding, Lapsus$ announced that they are looking to recruit insiders employed at telecommunications, software and gaming companies, among other technology businesses. The ransomware group specified that “they are not looking for data” but rather to buy remote VPN access to the corporate network. “Based on our investigation, the group is successful in their activities, and such tactics may generate a new trend in Dark Web for access brokers, especially, in post-pandemic times and increase of geopolitical tensions globally,” noted Christian Lees, CTO of Resecurity, Inc in an article for Security Affairs.

The threat of stolen code signing certificates

Lapsus$ is targeting source code and associated code signing certificates. Having possession and control over such source codes could create a massive supply chain reaction, which can lead to numerous organizations and machines being infected and harmed.

Attackers can use the compromised code signing certificates to sign malware, so it will appear to be legitimate and trustworthy and escape security solutions to be loaded and executed. In fact, according to Check Point, criminals have already exploited these stolen code signing certificates.

As part of the Nvidia leak, two code signing certificates have been compromised. Although they have expired, Windows still allows them to be used for driver signing purposes.

Code signing certificates assign a digital signature on executable software and firmware to allow them and mark them as trusted. Using these stolen certificates, attackers are practically disguising files and executables as legitimate, bypassing security controls and allowing malware to be uploaded to Windows.

“Stolen code signing certificates can be used to bypass security policies that require signed code to execute on a system. They can also be used by malicious actors to mimic a legitimate company,” said Pratik Savla, Senior Security Engineer at Venafi.

How to protect your code signing keys

“For years, we’ve been preaching to our customers that code signing keys are like master keys to a kingdom that has locks that can never be changed,” said Eddie Glenn, Sr Product Marketing Manager at Venafi.

The following steps can help you protect your code signing keys:

  • Always secure the code signing keys in a protected facility offering encryption, like a Hardware Security Module (HSM).
  • Always monitor and control the access to these keys to create an irrefutable log of every code signing operation.
  • Access to critical code signing keys should follow principles like segregation of duties and two-man-rule.
  • Control access to code signing keys with a clear set of whitelisting parameters.

Venafi CodeSign Protect secures your code signing private keys, automates approval workflows, and maintains an irrefutable record of all code signing activities. You can protect your company’s software with a secure code signing process that is fast and easy for your developers to use.

Source: Brooke Crothers
Via: Security Boulevard
Tags: Lapsus$: The New Name in Ransomware Gangs
ShareTweet

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025

Recent News

  • Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa July 29, 2025
  • French Telco Orange Hit by Cyber-Attack July 29, 2025
  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version