Samsung has confirmed that elements of the Galaxy source code were stolen by hackers, but said no customer data was compromised.

In a statement to Bloomberg, the Korean electronics giant admitted a cybersecurity breach that led a hacking group to post a 190GB torrent file on a Telegram channel just before the weekend.

The hacking group called LAPSUS$, which claimed responsibility for the attack, said the massive file contained the bootloader source code for recent devices, as well as biometric security information. Of course, some security-conscious Galaxy owners were right to be concerned about that.

However, Samsung says the initial analysis shows that the data theft will not affect customers. It also claimed to have strengthened security to prevent a repeat of the incident. The company has not confirmed the identity of the hackers, who also claimed to have recently carried out a similar hack on Nvidia.

“There was a security breach involving certain internal company data,” a Samsung representative said in the statement. “According to our initial analysis, the breach involves source code related to the operation of Galaxy devices, but not the personal information of our consumers or employees. We currently do not expect any impact on our business or our customers. We have taken steps to prevent further such incidents and will continue to serve our customers without interruption.”

The hacking group had also attempted to extort Nvidia during a recent hack. It promised to leak the data unless the chipmaker removes the cryptocurrency mining limits on its GPUs. Samsung did not disclose whether it was subject to such conditions.

Trusted Reviews have reached out to Samsung representatives with further questions about the hack. We will update this story if there is a response.

This post Samsung confirms massive hack of Galaxy source code, but says users are unaffected

was original published at “https://www.trustedreviews.com/news/samsung-confirms-huge-galaxy-source-code-hack-but-says-users-unaffected-4214919?utm_source=keystone&utm_medium=keystone_core_reviews_rss&utm_campaign=trusted+reviews”