Content, Breach

Nvidia Cyberattack Timeline and Recovery Updates

<> on May 10, 2018 in Santa Clara, California.

A cyberattack targeting Nvidia allegedly involved the Lapsus$ ransomware gang, according to a tweet from DarkTracer. Attackers have since leaked some Nvidia company information online, but the cyberattack did not impact the company's operations and there's no evidence that ransomware was deployed on Nvidia's network, the chip maker has stated.

Here's a timeline tracking the Nvidia cyberattack:

Tuesday, March 1, 2022: Nvidia said a cyberattack group has leaked some employee credentials and some company proprietary information online. Source: Reuters.

Monday, February 28: Lapsus$ allegedly begins to leak some Nvidia data. Source: Infosec pundit Soufiane Tahiri.

Saturday, February 26, 2022: Screen shots allegedly show Lapsus$ had leaked Nvidia employee passwords. Also, the alleged hackers apparently threaten to release 1TB in stolen data. Source: DarkTracer.

Friday, February 25, 2022: Multiple updates...

  • An apparent cyberattack took parts of Nvidia's business offline for two days, though the chipmaker later said the attack did not impact operations. Source: The Telegraph.
  • The incident appeared "relatively minor." Source: Bloomberg.

January 23, 2022: Nvidia became aware of the breach on this day, though the attack would not be reported by media until late February. Source: Reuters.

Nvidia did not say whether it hired an incident response company or MSSP to investigate and mitigate the attack.

Lapsus$ Ransomware Gang Background

Lapsus$ appears to be a relatively new gang in the cyberattack market. Example Lapsus$ ransomware attack victims include Impresa (a Portugal-based media conglomerate), Brazil's Ministry of Health (MoH) and Brazilian telecom firm Claro, according to a TitanHQ overview of Lapsus$.

Joe Panettieri

Joe Panettieri is co-founder & editorial director of MSSP Alert and ChannelE2E, the two leading news & analysis sites for managed service providers in the cybersecurity market.