Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Hacktivism

Lapsus$ hackers target Microsoft and Nvidia

admin by admin
Dec 22, 2022
in Hacktivism
0 0
A A
0
FacebookTwitterLinkedIn

The Tech Monitor review of the year continues as we take a look back at March, when one of the most confusing hacking gangs of recent times – Lapsus$ – emerged onto the scene.

For a few brief weeks in March it felt like all the biggest names in tech were at the mercy of previously little-known hacking gang by the name of Lapsus$.

A flurry of activity saw Lapsus$ claim a list of victims to make even the most hardened of cybercriminals jealous: Microsoft, Nvidia and Samsung were among the companies said to have been breached by the group, with Microsoft even detailing its attack and posting advice on how to combat the hackers and their seemingly crude tactics.

Microsoft was among the big tech companies hacked by Lapsus$ in March (pic: Volodymyr Plysiuk/Shutterstock)

The gangs penchant for targeting high-profile companies and fondness for big proclamations (at one point they boasted of recruiting insiders at target businesses to aid their campaign) led security researchers to conclude their actions were more politically than financially motivated, bringing to mind hacktivist groups such as Anonymous, which first emerged in the mid-2010s. “They’ve targeted the big boys and are likely fully aware that while their footprint has dramatically increased, so has the target on their backs,” warned Chris Morgan, senior threat intelligence analyst at Digital Shadows.

So it proved as, later in the month, UK police arrested seven teenagers in connection with Lapsus$ activities, while the mastermind behind Lapsus$ was named in reports as a 16-year-boy. Little has been heard from the group since; as Neil Young once sang, it’s better to burn out than to fade away.

EU sticks it to Big Tech with the Digital Markets Act

As Big Tech companies bolstered their cyber defences against Lapsus$, the European Union geared up for a regulatory assault on Google, Meta et al by agreeing the terms of its Digital Markets Act (DMA).

The law takes a new proactive approach to regulating the digital economy, and was billed as a bid to force tech giants to rethink they way they integrate their digital services and handle data from customers.

It puts new obligations on so-called ‘gatekeepers’ that operate ‘core platform services’ that are relied on by internet users, such as search engines, operating systems, cloud platforms and digital marketplaces. The rules prohibit certain behaviours, such as self-preferencing and using data collected by one service to optimise another, with heavy fines in prospect for those that don’t comply.

Content from our partners
How adopting B2B2C models is enabling manufacturers to get ever closer to their consumers

Technology and innovation can drive post-pandemic recovery for logistics sector

How to engage in SAP monitoring effectively in an era of volatility

Of course the big question was, would Big Tech comply? Early signs suggest the gatekeepers will acquiesce to EU demands, with Amazon having reportedly agreed a settlement with the European Commission over antitrust charges it faced regarding its supposedly self-preferencing behaviour, in part to remain compliant with the DMA.

Data sharing is caring for the Europe and the US

Elsewhere a new agreement which could allow data to flow safely between the European Union and the United States was drawn up.

The new EU-US data transfer framework was agreed following talks between the EU and the US government that culminated during a visit to Brussels by US President Joe Biden. President Biden said the new arrangement would “once again authorise transatlantic data flows that help facilitate $7.1trn in economic relationships,” and has since signed it into law via an executive order.

Whether the agreement, which was unsurprisingly welcomed by cloud providers such as Google Cloud and Microsoft Azure, will survive contact with the European Court remains to be seen. Two previous iterations of the data transfer agreement, known as Safe Harbour and Privacy Shield, have been invalidated by the court because they were deemed incompatible with Europe’s general data protection regulations (GDPR). This is because US law allows its government to requisition data from companies on national security grounds, something which is a no-no under GDPR.

Privacy campaigner Max Schrems, who brought the court cases against the previous versions of the agreement, wasted no time voicing his opposition to the latest plan, and could return to court with a new challenge. “It would be surprising if Schrems didn’t have another go, he’s probably looking for his hat-trick,” Jagvinder Singh, international and UK head of IT at law firm Mills & Reeve, told Tech Monitor. “The courts highlighted several issues [in the previous cases] and there will be aspects that haven’t been addressed by this new framework and operations which still happen in a way that don’t provide the necessary assurances.”

Topics in this article :

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.
Hacktivism

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.

Healthcare industry most common victim of third-party breaches, Black Kite finds
Hacktivism

Healthcare industry most common victim of third-party breaches, Black Kite finds

Why cybercrooks love Telegram Messenger
Hacktivism

Why cybercrooks love Telegram Messenger

Preparing for an attack on the war’s anniversary.
Hacktivism

Preparing for an attack on the war’s anniversary.

Hacktivism Is a Risky Career Path
Hacktivism

Hacktivism Is a Risky Career Path

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams
Hacktivism

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams

Pro-Russia Hacktivist Group’s Support and Influence Grows
Hacktivism

Pro-Russia Hacktivist Group’s Support and Influence Grows

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks
Hacktivism

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks

The global ICS security market is projected to grow from USD 16.7 Billion in 2022 to USD 23.7 Billion by 2027, at a Compound Annual Growth Rate (CAGR) of 7.2% from 2022 to 2027
Hacktivism

The DDOS protection and mitigation security market is projected to grow from USD 3.9 billion in 2022 to USD 7.3 billion by 2027, at a CAGR of 132%

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.