LockBit hackers say they hacked one of the world’s most important companies
July 3, 2023
0
The robbers claim Hacked TSMC, the world’s largest contract chip maker, works with well-known consumer electronics brands: Realtek, AMD, NVIDIA, Qualcomm, Apple and others. This company is responsible
The robbers claim Hacked TSMC, the world’s largest contract chip maker, works with well-known consumer electronics brands: Realtek, AMD, NVIDIA, Qualcomm, Apple and others. This company is responsible for most of the world’s microchips, and its closure could have major ramifications for almost the entire world economy.
what is known
Request by LockBit hackers $70 million purchaseIt is known as one of the biggest acquisitions in history. In return, they promise not to transfer the stolen data to the network. The deadline is 6 July.
TSMC recently became aware that one of its IT hardware vendors had experienced a cyber incident that leaked information about the initial setup and configuration of the server. At TSMC, every hardware component goes through a comprehensive set of checks and settings, including security configuration, prior to installation. According to the analysis results, this event did not affect TSMC’s business activities and did not compromise any information about TSMC’s customers. – reported in the company.
TSMC also stressed that immediately after the incident, the company “immediately stopped exchanging data with the affected supplier.” The manufacturer reported that the investigation into the incident is still ongoing and law enforcement has already been involved.
Instead, hackers are keeping their ground. They first posted a post on twitter claiming proof (the thread has now been deleted, but the media reported that the screenshots show access to systems, apps, and also contain credentials for various internal systems and email addresses. Make sure this data belongs. TSMC , it was impossible) and then a new entry dedicated to TSMC appeared on darknet sites.
Message from hackers / ArsTechnica screenshot
A short time later, Kinmax Technology released its own statement stating that on June 29, 2023, the test environment was compromised and the attackers did indeed manage to retrieve the data. It was mostly about installation information that the company provided to customers along with installation guides.
The above information has nothing to do with the actual implementation on the client side and only relates to the basic configuration at the time of shipment. As of now, it is known that the client has not suffered any damage and has not been hacked, – Specified in Kinmax Technology.
Kinmax Technology writes that after detecting the attack, it immediately disables compromised systems and notifies the affected customer what happened. But it doesn’t say what kind of client it is.
It’s unclear why the hackers asked for as much as $70 million.
John Wilkes is a seasoned journalist and author at Div Bracket. He specializes in covering trending news across a wide range of topics, from politics to entertainment and everything in between.