LAPSUS$ data extortion group claims to have a huge collection of confidential data stolen from Samsung Electronics, which has confirmed a security breach. Credit: PeopleImages / Getty Images South Korean consumer giant Samsung has reportedly suffered a major data breach with extortion group LAPSUS$ claiming to have access to 190GB of Samsung information. Ransomware is believed to be the attack method used by LAPSUS$ to target Samsung, which has confirmed a security breach of certain internal company data. The incident comes just a week after the same group released a 20GB document archive from 1TB of data stolen from graphics chip maker Nvidia.Attackers claim to have 190GB of Samsung dataThe ransomware group first teased the data haul on Friday, March 4, with a snapshot of C/C++ directives in Samsung software. A description of the leak was subsequently published that cited source code for every Trusted Applet installed in Samsung’s TrustZone environment used for encryption, access control, and hardware cryptography. LAPSUS$ posted three torrent files adding up to 190GB, supposedly containing the stolen data. Included in the torrent was a short description for the content available in each of the three archives, according to Bleeping Computer:Part one contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items.Part two contains a dump of source code and related data about device security and encryption.Part three contains various repositories from Samsung Github: mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES.Samsung confirms security breach of internal company dataIn a statement to Bloomberg today, a Samsung spokesperson confirmed that a security breach had occurred. “There was a security breach relating to certain internal company data,” Samsung said. “According to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices but does not include the personal information of our consumers or employees. Currently, we do not anticipate any impact to our business or customers. We have implemented measures to prevent further such incidents and will continue to serve our customers without disruption.” Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe