{"id":353,"date":"2022-03-02T18:09:11","date_gmt":"2022-03-02T18:09:11","guid":{"rendered":"https:\/\/globalgoodplay.com\/?p=353"},"modified":"2022-11-07T10:02:02","modified_gmt":"2022-11-07T10:02:02","slug":"nvidia-hacked-a-national-security-disaster","status":"publish","type":"post","link":"https:\/\/globalgoodplay.com\/?p=353","title":{"rendered":"Nvidia Hacked \u2013 A National Security Disaster"},"content":{"rendered":"<p>Nvidia was hacked for a vast sum of data and this hack is not only a disaster for Nvidia, but all chip companies and the national security of all \u201cwestern\u201d governments. A black hat group known as Lapsus$ has claimed responsibility for the attack, and states they are not a nation state actor.<\/p>\n<p>Lapsus$ demands are odd. The initial demand was for a payment, but later they tacked on many more demands including pushing driver updates, open sourcing much of their software, and fully removing any cryptocurrency limiters. Nvidia has yet to agree to any of these demands, and law enforcement has been involved. The contents of this hack that have already been released have major implications, but the threatened release on Friday would be a national security disaster.<\/p>\n<figure class=\"wp-block-image size-full\"><\/figure>\n<p>After the initial hack, Lapsus$ announced they had over 1TB of data. The group claimed that Nvidia attempted to hack them back. The hackers responded by releasing a file that included password hashes of all Nvidia employees. This was severe blow, but relatively minor compared the other data they have released. Alongside the initial announcement, they also stated they were selling \u201cfull LHR V2.\u201d<\/p>\n<p>In February of 2021, Nvidia implemented LHR (Lite Hash Rate) on their newest RTX 3060 GPU which halved the rate at which popular crypto currencies such as Ethereum were mined. As the year progressed, they implemented this on all of their gaming GPUs as a way to make GPUs less attractive to crypto currency miners and more affordable for gamers. The \u201cfull LHR V2\u201d is supposed to circumvent all mining performance limiters on Nvidia\u2019s gaming GPUs.<\/p>\n<p>The group used their source code access to recompile the driver without these mining limiters and immediately began selling it for $10. They later revised this price to $1,000,000.<\/p>\n<figure class=\"wp-block-image size-full\"><\/figure>\n<p>They also then released a file containing a large amount of data. This included all source code for drivers so other firms can recompile drivers. This source code included not only the gaming drivers, but also datacenter and AI GPU drivers, Nvidia\u2019s proprietary AI upscaling technology known as DLSS, Ansel, Nvidia documentation, and Nvidia AI libraries such as NV-Torch and NV-Caffe. In addition, the file contains all of Nvidia\u2019s GPU architectural configuration files for their next generation GPUs known as Hopper and Lovelace. Lastly, it also included Nvidia\u2019s testers and simulation files.<\/p>\n<p>This data alone shows Nvidia\u2019s plans down to architectural decisions and configurations for the GPUs that Nvidia will launch later this year. Nvidia has a 2-year cycle, so the data leaked is what Nvidia will still be selling as their top products well into 2024\u2026 A complete disaster.<\/p>\n<p>Nvidia\u2019s proprietary software is considered to be its edge over its competitors. Part of this includes the testers and simulator files. This shows how Nvidia simulates their chip design and weighs various architectural decisions. In short, this is a critical part of Nvidia\u2019s proprietary design process, and it is now in the public domain. With this data, the multiple Chinese AI and GPU firms can kickstart and catch up massively on the design of their GPUs. Western competitors would not touch this with a 10 foot pole due to being illegal and unethical, but as shown by Huawei in the last two decades, many others will blatantly violate these norms.<\/p>\n<figure class=\"wp-block-image size-full\"><\/figure>\n<p>The group is now threatening to release a hardware folder that is 250GB. They allege this folder contains critical silicon design documents and code including the Verilog. With this access, there would be direct access to Nvidia\u2019s design. In addition, they claim to have all details related to Nvidia\u2019s Falcon control and security processor. Malicious semiconductor firms could look through these files, learn as much as possible and directly apply these learnings to their future products. They could go as far as reverse engineering the designs for SMIC\u2019s 14nm process node. The only silver lining is that Verilog files may potentially be encrypted.<\/p>\n<p>In the past, a malicious actor hacked AMD and gained access to their Navi 21 GPU Verilog files. The hacker demanded $100 million, but they were not complete and gibberish. The level of access that Lapsus$ seems to have would make it plausible that they have access to the entire Verilog file in an unencrypted format. Semiconductor architecture designers and firms will likely have to deal with increased levels of IT security given the gravity of the Nvidia hack. Even intra-company sharing is likely to be impacted by new security practices that must be implemented in the wake of these security vulnerabilities.<\/p>\n<p>The release of complete Verilog data would be a complete disaster for Nvidia and western national security. In essence, the blueprint of these chips, the product of a $580 billion company and $30 billion of research and development could be in the hands of hostile actors. The hacked data, which could have been sold to a nation-state actor, could very well prove the most strategically significant act of corporate espionage in a generation. With direct access to designs of the world\u2019s most advanced GPUs and AI processors, Chinese design firms could be able to dramatically increase the speed with which they catch up to their western competitors in all fields related to artificial intelligence and semiconductors. If, on the off chance that this data is not already in China\u2019s hands, the US Government should mobilize its cybersecurity arsenal to prevent PRC firms\u2019 ability to access this data. This intellectual property must be defended.<\/p>\n<div class=\"is-horizontal is-content-justification-center is-layout-flex wp-container-19 wp-block-buttons\">\n<div class=\"wp-block-button\">Join the newsletter!<\/div>\n<\/div>\n<p>Edit: Nvidia\u2019s reached out and referred us to their official statement. We agree and do not believe this is related to the Russia-Ukraine conflict. The importance of the security breach isn\u2019t really up for discussion given the materials, which do pertain to national security interest. Nvidia\u2019s technology is core to the western dominance in many aspects of semiconductors and computing.<\/p>\n<blockquote class=\"wp-block-quote\"><p>We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Russia-Ukraine conflict.<\/p><\/blockquote>\n<p><em>Clients and employees of SemiAnalysis may hold positions in companies referenced in this article<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hack contains sensitive info on future GPU configurations, source code for software, tester, simulation, and Verilog code.<br \/>\nThis could be the most significant act of corporate espionage in a generation.<\/p>\n","protected":false},"author":1,"featured_media":604,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/posts\/353"}],"collection":[{"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=353"}],"version-history":[{"count":1,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/posts\/353\/revisions"}],"predecessor-version":[{"id":605,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/posts\/353\/revisions\/605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=\/wp\/v2\/media\/604"}],"wp:attachment":[{"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globalgoodplay.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}