• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
Why Nvidia’s Hack Is More Important Than You Think

Why Nvidia’s Hack Is More Important Than You Think

March 15, 2022 Posted by Adam Maraziti IT Security

A South American-based hacking group that goes by LAPSUS$ has claimed responsibility for the recent cyberattack on Nvidia. Nvidia engages in the design and manufacturing of computer graphics processors, chipsets, and related multimedia software.  They are arguably the leader in the graphics card market and, as such, work closely with a lot of software companies including Microsoft. The cyber-attack leaked the credentials of approximately 71,000 Nvidia employees which was later confirmed by the popular data-breach-monitoring website Have I been Pwned. LAPSUS$ posted the following on their twitter account:  

Based on the information discovered to date, it appears that along with the 70k+ employee emails were the employees’ NTLM password hashes, many of which have been subsequently cracked and circulated within the hacking community.  Fortunately, Nvidia can easily “fix” the risk involved by forcing all their users to change their passwords.  Our assumption is that this has already occurred.  

While the credentials are making most of the headlines, unfortunately this isn’t the most important part of the data breach.  In a statement released by Nvidia confirming the cyberattack, they went on to say, “We are aware that the threat actor took employee credentials and some NVIDA proprietary information from our systems and has begun leaking it online.”  That proprietary information they mentioned included two code-signing certificates.

As seen above, the certificates are expired. However, Windows still allows them to be used for driver signing purposes. In most cases, Windows doesn’t care if the certificate is expired or revoked because what you see in the digital signature section of a driver is not something that the kernel checks for when determining whether to load a driver. When it says that a certificate is explicitly revoked, that is what “WinVerifyTrust” is returning and not what the kernel cares about (the WinVerifyTrust function performs a trust verification action on a specified object. More on WinVerifyTrust can be found on Microsoft’s Website). That said, because the kernel accepts the expired certificate, most antivirus companies out there do not flag this as a threat.

We are already seeing multiple instances of malware utilizing these signed driver certificates in order to bypass antivirus. Thanks to @vxunderground on Twitter, we were able to obtain samples of the malware being used in Quasar.exe which is a Remote Administration Tool. We can see it has a valid signature, and the signers and certificate are Nvidia Corporation.

As you can probably imagine, this is just the beginning of the abuse of these certificates. Unfortunately, we likely won’t see a fix in the form of Microsoft adding these to their certificate revocation list anytime soon. Doing so would most likely cause legitimate Nvidia drivers to be blocked, too. Conversely, there is a way that organizations can combat it. David Weston, Director of Enterprise and OS Security at Microsoft, Tweeted that admins can configure Windows Application Control policies to control what Nvidia drivers can be loaded.

If there was ever a time to be vigilant on what you click or install, now is the time.

Share
0
Adam Maraziti

About Adam Maraziti

Highly adaptable leader with over ten years of dedicated IT work experience implementing, securing and supporting a financial institution. Experience auditing various technologies to ensure compliance with local and foreign regulations such as Federal Financial Institutions Examination Council (FFIEC), Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GBLA), and Office of the Comptroller of the Currency (OCC). Ability to manage internal IT staff and external vendors proficiently.

You also might be interested in

cybersecurity requirements

Enhanced Cybersecurity Requirements for Federal Contractors

Feb 5, 2018

The Defense Federal Acquisition Regulation Supplement (DFARS) has been a[...]

ISO 27001 vs SOC

ISO 27001 vs SOC Standards: Which Should You Choose?

Apr 11, 2025

Organizations today have a wealth of options to choose from[...]

Don’t Fall Victim To A W-2 Phishing Scam
Phishing Scam, Computer Keyboard with a yellow blank sticky note with text Phishing Scam

Don’t Fall Victim To A W-2 Phishing Scam

May 29, 2018

Businesses have been victimized by W-2 phishing scams in growing[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next