The image shows an unknown hacker and data on the screen. The hacker group lapsus$ is still mostly anonymous

Meet the Lapsus$ hacker group and learn how it operates 53391s

Avatar of Ricardo Buçard
Learn all about the Lapsus$ hacker group, responsible for attacks on Conect SUS, Microsoft, NVIDIA and several other companies

The Lapsus$ hacker group, an organization that gained notoriety in Brazil by taking down the Federal Government app Connect SUS as of December 2021, represents a big issue in the tech world when it comes to cybersecurity and hacker attack. Learn more about this criminal organization, known , how it works and how you can protect yourself from it. 3h54p

Which companies were attacked by Grupo Lapsus$ and how 245d5i

Since they dropped the Connect SUS, the group has already assumed attacks on several technology companies around the world. Among the cases known and assumed by the group are attacks on Okta, a giant in the field of access management, Microsoft, NVIDIA, Samsung, Ubisoft, Finds, Embratel, Clear, post offices e FIB Bank. However, the form of the attacks varies.

There are cases of unauthorized access to data or source code, as in the cases of Okta, Microsoft, NVIDIA and Samsung. In addition to these cases, there were also cases of blocking access to online services Ubisoft and the Post Office are the most affected by this method. Another form of attack by this group is the extortion and data destruction, as in the case of Conect SUS.

There are also scenarios in which the group tamper with official websites of companies, as in the case of Localiza, a Brazilian car rental company, which had its website redirecting s to pornographic content, in addition to denial of services. Finally, there were attacks intrusion into internal systems of companies with a ransom request, such as what happened with telephone companies such as Embratel and Claro. In these attacks, hackers even posted images of these systems to prove the veracity of the intrusion.

In a hacker attack, Grupo Lapsus$ demanded a ransom to return extorted data.

The most serious cases were against Okta, which had data from 2,5% of its customers leaked, which includes 366 companies, in addition to Microsoft, NVIDIA and Samsung, which had source codes stolen from several products, such as Bing, Cortana, data from natural of video cards and biometrics algorithms and boat cell phones.

As pointed out by experts and even by Microsoft in Phishing, a practice widely used to obtain information about a target and then infer data and s about that person or organization. Usually, this type of attack involves asking for personal information such as the person's mother's name, pet, etc.

The attacks are publicized on the group's Telegram channel, which already has almost 50 subscribers — there is no official website for postings or ransom requests, as has become customary on the part of predecessor groups to this one. Some targets are decided by votes on this channel, which is also unusual so far. The group claims to have no political interest in its attacks, but this was also claimed by previous groups. According to experts, the group's goal seems to be fame and respect in the community, not effectively obtaining money through ransoms or data theft.

Who is part of the Lapsus$ hacker organization? 5c4jb

Not much is known about the group, its leaders and the motives behind these attacks. Most experts believed that the majority of its or leaders were located in South America, especially in Brazil, due to the focus on Brazilian companies. In the case of FIB Bank, the attack was carried out after the revelation of the bank's involvement in an agreement for the purchase of Indian vaccines Covaxin by the Ministry of Health, accused of overpricing in the I of Covid. However, that may not be the case.

Connectsus app is reinstated, says health ministry | agency brazil
Connect SUS was one of the applications targeted by the Lapsus$ group. (Image: Agência Brasil)

In news reported by the BBC, seven people aged between 16 and 21 were arrested and then released in London in late March, accused of being part of the group. Among these people is a 16-year-old from Oxford, England, accused of being one of the leaders of the criminal organization and a Brazilian. The people arrested are still considered suspects by the British police, which are carrying out investigations into the case. There is no further information about the Brazilian member.

The young British man would have accumulated more than 300 Bitcoins, a value above R$60 million at the current exchange rate. criptomoeda, through attacks and ransom demands. He had his identity protected, called by the codename 'White', or White, in English translation. His capture was possible after the hacker himself was the target of an attack by a business partner with whom he had problems. Despite this, specialized British police were already following his activity on the internet, as the boy was not effectively hiding his tracks. online.

The parents of 'White' gave an interview to the English press and stated that they were not aware of their son's involvement in this type of activity, but that they knew that he spent several hours in front of the computer, in what they believed to be games. online.

How to protect yourself from the Lapsus$ hacker group 6u2

There are several signs that an email, link, or website could be a scam. Phishing, one of the most practiced by this group, and it is necessary to be attentive and prepared to avoid the worst scenarios if you become a victim of this type of attack.

The image shows an illustration of phishing attacks, one of the most practiced by the lapsus$ group
Phishing, one of the types of hacker attacks most practiced by the Lapsus$ group, is done to trick the into giving away security information.

In this type of hacking attack, the person receives an email that pretends to be a bank official, for example, an acquaintance, or a brand offering a promotion. This email contains a link to click, and in it, there is a form asking for sensitive information such as s, tips for s, etc. In this way, the hacker organization behind this scheme gets all the information directly from the without having to install a with malicious on someone else's computer.

This scheme can also be applied by WhatsApp messages or even by links found on social networks and Google itself. It is necessary to be aware of signs that you may be the victim of an attack, such as emails or institutional websites with grammatical errors and official channels asking for information such as F, number and sensitive data by message. Even so, there are other more subtle clues.

One of the ways to identify Phishing is to notice the difference between the text of the link in the message and the link that it actually takes you to. For example, the text shows a link to access your bank , but the link is actually an IP address held by the group that wants to steal your information. It's always important pay attention to the address you are accessing and confirm to be safe!

In other, more sophisticated scams, a company's official website is copied almost identically through an image and then a message appears on the screen asking for your credentials. In this case, there are always elements that cause strangeness when accessing the site, such as some feature of the layout not being in its usual place or the logo being one of the old versions, or even the site itself being older.

Finally, one of the easiest ways to detect this type of attack is the email addresses that send the message, usually with a name that seems random, with different numbers and letters, or that impersonates a company, but who sent was actually someone's personal address. Another point of attention is who the message was sent to: in the case of official means of communication with the customer, messages are sent individually, while organizations usually send mass emails to several possible victims.

Other important ways to protect yourself from any attack that involves taking access to your are: enable two-step verification for all your s, through applications such as Microsoft Authenticator and also avoid leaving personal information publicly on the internet. The less information a hacker organization knows about you, the harder it is for them to be able to extract sensitive data from you through Phishing.

See also:

Did you like the article about the Lapsus hacker group? Also check how to hire a hacker.

Sources: with the BBC, Z, Wired, Indian Express e Valor Econômico

1 comment 5v5j2f
Leave a comment Cancel reply 26673o
Related Posts 593ri

The 10 most impressive humanoid robots of the moment l4x28

The world of robotics is at its peak with the biggest technology companies competing to launch the first commercially accessible multi-functional humanoid robot.
mario mamede avatar
Learn more

OpenAI and FDA to Use AI in Drug Evaluation 621p1m

The US federal agency responsible for regulating medicines wants to speed up the evaluation process using the cderGPT artificial intelligence project. Understand
Alexandre Marques Avatar
Learn more