駭客洩漏 190GB 三星資料和原始碼 - 手機討論

By Emily
at 2022-03-05T14:18
at 2022-03-05T14:18
Table of Contents
1.原文連結:連結過長者請使用短網址。
https://reurl.cc/VjlNgn
2.原文標題:標題須完整寫出(否則依板規刪除並水桶)。
Hackers leak 190GB of alleged Samsung data, source code
3.原文來源(媒體/作者):例:蘋果日報/王大明(若無署名作者則不須)
BleepingComputer / Ionut Ilascu
4.原文內容:請刊登完整全文(否則依板規刪除並水桶)。
The Lapsus$ data extortion group leaked today a huge collection of
confidential data they claim to be from Samsung Electronics,
the South Korean giant consumer electronics company.
機翻:
Lapsus$ 資料勒索組織今天洩露了他們聲稱來自韓國消費電子巨頭
三星電子的大量機密資料。
The leak comes less than a week after Lapsus$ released a 20GB document
archive from 1TB of data stolen from Nvidia GPU designer.
機翻:
在 Lapsus$ 從 Nvidia GPU 設計者竊取的 1TB 資料中發布 20GB
文檔檔案後不到一周,洩漏就發生了。
Gang teases Samsung data leak
機翻:
勒索組織取笑三星資料洩露
In a note posted earlier today, the extortion gang teased about
releasing Samsung data with a snapshot of C/C++ directives in Samsung
software.
機翻:
在今天早些時候發布的一份說明中,勒索組織取笑了有關發布三星資料
以及三星軟件中 C/C++ 指令快照的內容。
https://imgur.com/a/WBpXcH1
Shortly after teasing their followers, Lapsus$ published a description of the
upcoming leak, saying that it contains “confidential Samsung source code”
originating from a breach.
機翻:
在取笑他們的追隨者後不久,Lapsus$ 發布了對即將發生的洩密事件的描述,
稱其中包含源自洩露的「機密三星原始碼」。
- source code for every Trusted Applet (TA) installed in Samsung’s TrustZone
environment used for sensitive operations (e.g. hardware cryptography, binary
encryption, access control)
機翻:
三星 TrustZone 環境中安裝的每個受信任小應用程式 (TA) 的原始碼,
用於敏感操作(例如硬體加密、二進制加密、存取控制)
- algorithms for all biometric unlock operations
機翻:
所有生物特徵解鎖操作的算法
- bootloader source code for all recent Samsung devices
機翻:
所有最新三星裝置的引導程式原始碼
- confidential source code from Qualcomm
機翻:
來自高通的機密原始碼
source code for Samsung’s activation servers
機翻:
三星授權伺服器的原始碼
- full source code for technology used for authorizing and authenticating
Samsung accounts, including APIs and services
機翻:
用於授權和驗證三星帳號的技術的完整原始碼,包括 API 和服務
If the details above are accurate, Samsung has suffered a major data breach
that could cause huge damage to the company.
機翻:
如果上述詳細信息準確無誤,則三星已遭受重大數據洩露,
可能對公司造成巨大損害。
Lapsus$ split the leaked data in three compressed files that add to almost
190GB and made them available in a torrent that appears to be highly popular,
with more than 400 peers sharing the content. The extortion group also said
that it would deploy more servers to increase the download speed.
機翻:
Lapsus$ 將洩露的數據拆分為三個壓縮檔,這些文件增加了近 190GB,
並使它們可用的 torrent 形式,似乎非常受歡迎,有 400 多個使用者群共享內容。
勒索組織還表示,將部署更多伺服器以提高下載速度。
https://imgur.com/ywX9uqJ
Included in the torrent is also a brief description for the content available
in each of the three archives:
機翻:
torrent 中還包含對三個檔案中每個檔案中可用內容的簡要說明:
- Part 1 contains a dump of source code and related data about
Security/Defense/Knox/Bootloader/TrustedApps and various other items
機翻:
第 1 部分包含有關 Security/Defense/Knox/Bootloader/TrustedApps 和其他各種項目
的原始碼和相關資料的轉儲
- Part 2 contains a dump of source code and related data about device security
and encryption
機翻:
第 2 部分包含有關裝置安全和加密的原始碼和相關資料的轉儲
- Part 3 contains various repositories from Samsung Github: mobile defense
engineering, Samsung account backend, Samsung pass backend/frontend, and SES
(Bixby, Smartthings, store)
機翻:
第 3 部分包含來自三星 Github 的各種儲存庫:行動(裝置)防護工程、三星帳號後端、
三星通行證後端/前端和 SES(Bixby、Smartthings、商店)
It is unclear if Lapsus$ contacted Samsung for a ransom, as they claimed in
the case of Nvidia.
機翻:
目前尚不清楚 Lapsus$ 是否聯繫三星索要贖金,
正如他們在 Nvidia 案中所聲稱的那樣。
BleepingComputer has contacted Samsung for a statement about the Lapsus$ data
leak and will update the article when the company replies.
機翻:
BleepingComputer 已聯繫三星就 Lapsus$ 資料洩露發表聲明,
並將在公司回覆時更新文章。
This is developing story
機翻:
這是發展中的故事
5.心得/評論:內容須超過繁體中文30字(不含標點符號)。
──────────────────────────────────────
Lapsus$ 真的有夠扯,前幾天才跟 Nvidia 槓上,
拿走 Nvidia 1TB 的資料,而且對外銷售 1 百萬美金 N 的 driver src
而且要求 N 要開源 GPU driver。
之前看到有一則訊息勒索組織說有一個人向它買了,
不過訊息貌似消失了
現在換三星中獎,
如果照他們說的話,沒有誇大不實的話
三星的資安真的GG了
--
https://reurl.cc/VjlNgn
2.原文標題:標題須完整寫出(否則依板規刪除並水桶)。
Hackers leak 190GB of alleged Samsung data, source code
3.原文來源(媒體/作者):例:蘋果日報/王大明(若無署名作者則不須)
BleepingComputer / Ionut Ilascu
4.原文內容:請刊登完整全文(否則依板規刪除並水桶)。
The Lapsus$ data extortion group leaked today a huge collection of
confidential data they claim to be from Samsung Electronics,
the South Korean giant consumer electronics company.
機翻:
Lapsus$ 資料勒索組織今天洩露了他們聲稱來自韓國消費電子巨頭
三星電子的大量機密資料。
The leak comes less than a week after Lapsus$ released a 20GB document
archive from 1TB of data stolen from Nvidia GPU designer.
機翻:
在 Lapsus$ 從 Nvidia GPU 設計者竊取的 1TB 資料中發布 20GB
文檔檔案後不到一周,洩漏就發生了。
Gang teases Samsung data leak
機翻:
勒索組織取笑三星資料洩露
In a note posted earlier today, the extortion gang teased about
releasing Samsung data with a snapshot of C/C++ directives in Samsung
software.
機翻:
在今天早些時候發布的一份說明中,勒索組織取笑了有關發布三星資料
以及三星軟件中 C/C++ 指令快照的內容。
https://imgur.com/a/WBpXcH1
Shortly after teasing their followers, Lapsus$ published a description of the
upcoming leak, saying that it contains “confidential Samsung source code”
originating from a breach.
機翻:
在取笑他們的追隨者後不久,Lapsus$ 發布了對即將發生的洩密事件的描述,
稱其中包含源自洩露的「機密三星原始碼」。
- source code for every Trusted Applet (TA) installed in Samsung’s TrustZone
environment used for sensitive operations (e.g. hardware cryptography, binary
encryption, access control)
機翻:
三星 TrustZone 環境中安裝的每個受信任小應用程式 (TA) 的原始碼,
用於敏感操作(例如硬體加密、二進制加密、存取控制)
- algorithms for all biometric unlock operations
機翻:
所有生物特徵解鎖操作的算法
- bootloader source code for all recent Samsung devices
機翻:
所有最新三星裝置的引導程式原始碼
- confidential source code from Qualcomm
機翻:
來自高通的機密原始碼
source code for Samsung’s activation servers
機翻:
三星授權伺服器的原始碼
- full source code for technology used for authorizing and authenticating
Samsung accounts, including APIs and services
機翻:
用於授權和驗證三星帳號的技術的完整原始碼,包括 API 和服務
If the details above are accurate, Samsung has suffered a major data breach
that could cause huge damage to the company.
機翻:
如果上述詳細信息準確無誤,則三星已遭受重大數據洩露,
可能對公司造成巨大損害。
Lapsus$ split the leaked data in three compressed files that add to almost
190GB and made them available in a torrent that appears to be highly popular,
with more than 400 peers sharing the content. The extortion group also said
that it would deploy more servers to increase the download speed.
機翻:
Lapsus$ 將洩露的數據拆分為三個壓縮檔,這些文件增加了近 190GB,
並使它們可用的 torrent 形式,似乎非常受歡迎,有 400 多個使用者群共享內容。
勒索組織還表示,將部署更多伺服器以提高下載速度。
https://imgur.com/ywX9uqJ
Included in the torrent is also a brief description for the content available
in each of the three archives:
機翻:
torrent 中還包含對三個檔案中每個檔案中可用內容的簡要說明:
- Part 1 contains a dump of source code and related data about
Security/Defense/Knox/Bootloader/TrustedApps and various other items
機翻:
第 1 部分包含有關 Security/Defense/Knox/Bootloader/TrustedApps 和其他各種項目
的原始碼和相關資料的轉儲
- Part 2 contains a dump of source code and related data about device security
and encryption
機翻:
第 2 部分包含有關裝置安全和加密的原始碼和相關資料的轉儲
- Part 3 contains various repositories from Samsung Github: mobile defense
engineering, Samsung account backend, Samsung pass backend/frontend, and SES
(Bixby, Smartthings, store)
機翻:
第 3 部分包含來自三星 Github 的各種儲存庫:行動(裝置)防護工程、三星帳號後端、
三星通行證後端/前端和 SES(Bixby、Smartthings、商店)
It is unclear if Lapsus$ contacted Samsung for a ransom, as they claimed in
the case of Nvidia.
機翻:
目前尚不清楚 Lapsus$ 是否聯繫三星索要贖金,
正如他們在 Nvidia 案中所聲稱的那樣。
BleepingComputer has contacted Samsung for a statement about the Lapsus$ data
leak and will update the article when the company replies.
機翻:
BleepingComputer 已聯繫三星就 Lapsus$ 資料洩露發表聲明,
並將在公司回覆時更新文章。
This is developing story
機翻:
這是發展中的故事
5.心得/評論:內容須超過繁體中文30字(不含標點符號)。
──────────────────────────────────────
Lapsus$ 真的有夠扯,前幾天才跟 Nvidia 槓上,
拿走 Nvidia 1TB 的資料,而且對外銷售 1 百萬美金 N 的 driver src
而且要求 N 要開源 GPU driver。
之前看到有一則訊息勒索組織說有一個人向它買了,
不過訊息貌似消失了
現在換三星中獎,
如果照他們說的話,沒有誇大不實的話
三星的資安真的GG了
--
Tags:
手機
All Comments

By Cara
at 2022-03-06T08:01
at 2022-03-06T08:01

By Sandy
at 2022-03-07T01:44
at 2022-03-07T01:44

By Poppy
at 2022-03-07T19:27
at 2022-03-07T19:27

By Adele
at 2022-03-07T06:01
at 2022-03-07T06:01

By Kyle
at 2022-03-07T23:44
at 2022-03-07T23:44

By Valerie
at 2022-03-07T06:01
at 2022-03-07T06:01

By Rae
at 2022-03-07T23:44
at 2022-03-07T23:44

By Tracy
at 2022-03-07T06:01
at 2022-03-07T06:01

By Catherine
at 2022-03-07T23:44
at 2022-03-07T23:44

By Jack
at 2022-03-07T06:01
at 2022-03-07T06:01

By Jacky
at 2022-03-07T23:44
at 2022-03-07T23:44

By Hardy
at 2022-03-07T06:01
at 2022-03-07T06:01

By Ingrid
at 2022-03-07T23:44
at 2022-03-07T23:44

By Agatha
at 2022-03-07T06:01
at 2022-03-07T06:01

By Bethany
at 2022-03-07T23:44
at 2022-03-07T23:44

By Christine
at 2022-03-07T06:01
at 2022-03-07T06:01

By Lucy
at 2022-03-07T23:44
at 2022-03-07T23:44

By Isla
at 2022-03-07T06:01
at 2022-03-07T06:01

By Ula
at 2022-03-07T23:44
at 2022-03-07T23:44

By Eartha
at 2022-03-07T06:01
at 2022-03-07T06:01

By Emma
at 2022-03-07T23:44
at 2022-03-07T23:44

By Lauren
at 2022-03-07T06:01
at 2022-03-07T06:01

By Linda
at 2022-03-07T23:44
at 2022-03-07T23:44

By Ina
at 2022-03-07T06:01
at 2022-03-07T06:01

By Hedda
at 2022-03-07T23:44
at 2022-03-07T23:44

By Brianna
at 2022-03-07T06:01
at 2022-03-07T06:01

By Steve
at 2022-03-07T23:44
at 2022-03-07T23:44

By Erin
at 2022-03-07T06:01
at 2022-03-07T06:01

By James
at 2022-03-07T23:44
at 2022-03-07T23:44

By Heather
at 2022-03-07T06:01
at 2022-03-07T06:01

By Hardy
at 2022-03-07T23:44
at 2022-03-07T23:44

By Emma
at 2022-03-07T06:01
at 2022-03-07T06:01

By Iris
at 2022-03-07T23:44
at 2022-03-07T23:44

By Andrew
at 2022-03-07T06:01
at 2022-03-07T06:01

By Adele
at 2022-03-07T23:44
at 2022-03-07T23:44

By Sarah
at 2022-03-07T06:01
at 2022-03-07T06:01

By Agatha
at 2022-03-07T23:44
at 2022-03-07T23:44

By Bethany
at 2022-03-07T06:01
at 2022-03-07T06:01

By Kelly
at 2022-03-07T23:44
at 2022-03-07T23:44

By Leila
at 2022-03-07T06:01
at 2022-03-07T06:01

By Carol
at 2022-03-07T23:44
at 2022-03-07T23:44

By Kelly
at 2022-03-07T06:01
at 2022-03-07T06:01

By Freda
at 2022-03-07T23:44
at 2022-03-07T23:44

By Dora
at 2022-03-07T06:01
at 2022-03-07T06:01

By Carol
at 2022-03-07T23:44
at 2022-03-07T23:44

By Isabella
at 2022-03-07T06:01
at 2022-03-07T06:01

By Skylar DavisLinda
at 2022-03-07T23:44
at 2022-03-07T23:44

By Frederic
at 2022-03-07T06:01
at 2022-03-07T06:01

By Mason
at 2022-03-07T23:44
at 2022-03-07T23:44

By Robert
at 2022-03-07T06:01
at 2022-03-07T06:01

By Rae
at 2022-03-07T23:44
at 2022-03-07T23:44

By Hazel
at 2022-03-07T06:01
at 2022-03-07T06:01

By Linda
at 2022-03-07T23:44
at 2022-03-07T23:44

By Hedy
at 2022-03-07T06:01
at 2022-03-07T06:01

By Enid
at 2022-03-07T23:44
at 2022-03-07T23:44

By Faithe
at 2022-03-07T06:01
at 2022-03-07T06:01

By Donna
at 2022-03-07T23:44
at 2022-03-07T23:44

By Erin
at 2022-03-07T06:01
at 2022-03-07T06:01

By Charlotte
at 2022-03-07T23:44
at 2022-03-07T23:44

By Oscar
at 2022-03-07T06:01
at 2022-03-07T06:01

By Rae
at 2022-03-07T23:44
at 2022-03-07T23:44

By Ursula
at 2022-03-07T06:01
at 2022-03-07T06:01

By Leila
at 2022-03-07T23:44
at 2022-03-07T23:44

By Emma
at 2022-03-07T06:01
at 2022-03-07T06:01

By Hamiltion
at 2022-03-07T23:44
at 2022-03-07T23:44

By Todd Johnson
at 2022-03-07T06:01
at 2022-03-07T06:01

By Ingrid
at 2022-03-07T23:44
at 2022-03-07T23:44
Related Posts
S22送500元APP商城禮券

By Steve
at 2022-03-05T13:15
at 2022-03-05T13:15
請問 Zenfone 8 Flip的購買?

By Agatha
at 2022-03-05T12:16
at 2022-03-05T12:16
聯發科將在 2022 年推出天璣 8000 處理

By Oliver
at 2022-03-05T12:15
at 2022-03-05T12:15
什麼牌子的磁吸充電線比較不會壞?

By Anthony
at 2022-03-05T11:38
at 2022-03-05T11:38
Anker a2667 65w心得

By Ursula
at 2022-03-05T05:45
at 2022-03-05T05:45