• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Mobile security

Samsung data breach by LAPSUS$ leak source codes and 190GB of data

John Greenwood Posted On March 9, 2022
0



Samsung data breach

Samsung has confirmed that the firm is hit by a security breach which has resulted in the exposure of internal company data, including the source code of its Galaxy Smartphones.

“According to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices, but does not include the personal information of our consumers or employees,” Samsung told Bloomberg.

LAPSUS$ hackers take responsibility for Samsung data breach

The LAPSUS$ hacking group has leaked the breached data into a Telegram channel which confirmed the data breach publicly.

Samsung Data Breach
Samsung Data Breach Info

This Samsung data breach exposed the source code for trusted applets installed within TrustZone, biometrics authentication, confidential data from Qualcomm’s chip, source code for Samsung’s activation servers, full source code used for authenticating Samsung accounts, including services/APIs, and boot-loaders for recent devices.

LAPSUS$ hackers is also become recently popular for their breach on NVIDIA data breach that got away with 1TB trove of proprietary data including employee name, credentials, schematics, driver source code and other details related to latest graphic chips. The LAPSUS$ group was first seen in December 2021, and demanded NVIDIA to open-source its GPU drivers and remove Ethereum cryptocurrency mining cap from the Graphic card manufacturer’s 30-series GPUs.

The demands for Samsung data breach is not known yet but researchers predict it could be around similar lines.

Samsung data breach and the data leak by LAPSUS$

LAPSUS$ has classified the stolen data into three compressed files that counts a totla of 190GB and it is published in a torrent for popularity, and is now shared by more than 400 peers actively. LAPSUS$ is also in process of including more severs to increase the download speed.

The classification of the Samsung data breach information is as follows,

  • Part 1: Contains the source code and data related to Security/Defense/Bootloader/TrustedApps/Knox.
  • Part 2: Contains source code related to device security and encryption.
  • Part 3: Contains several repositories of Samsung’s Github, Samsung account backend, Samsung backend/frontend, mobile defense engineering, and SES (Bixby, Smartthings, Store).
Samsung Data Breach
Samsung Data Breach

The South Korean company has confirmed that the data breach doesn’t affect its business and customers. They have also implemented appropriate measures to prevent such breaches in future.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


hackingSamsung Data Breach


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
CISA Alert: Ongoing Adobe ColdFusion Vulnerability Exploitation in Government Servers
December 6, 2023
Russian Hackers APT29 Exploits WinRAR Vulnerability
November 18, 2023
Scattered Spider: FBI and CISA Issue Warning on Elusive Cyber Threat
November 15, 2023
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search