More bad news for Nvidia – and advice for them (and you) on risk and mitigation – updated

This post was originally published on 5 March 2022

In the among the data recently stolen from Nvidia, a certificate has been found that can be used to sign malware aimed at Windows machines. What this means is the software will be exploiting the built in “trust” that Microsoft and Nvidia have established for their software, to get malware to bypass regular malware detection.

Leaked stolen Nvidia cert can code-sign Windows malware • The Register

Here is how that compromise would work:

Nvidia’s breach might help cybercriminals run malware campaigns | TechRepublic

This can be fixed by the software companies but it does leave a window of opportunity for any malicious activity.

This type of security certificate is by any standard an extremely valuable Nvidia asset – s o it either shows that the hackers penetrated the the most secure areas of the Nvidia network or that Nvidia was not storing this asset with the proper precautions?

This was lesson 101 in our Cyber Security Master Class, this week. What we taught our students was:

“Examine your assets, those that are most valuable either in money or operational impact, apply your best protection and resources to them to protect them.”

Smart Thinking Cyber Security Master Class – risk and mitigation

Clive Catton MSc (Cyber Security) – by-line and other articles

Further Reading

Ransomware gang demands the right to mine with Nvidia cards – Smart Thinking Solutions

Nvidia malware – on their internal systems and included in unauthorised “unlocking” software – Smart Thinking Solutions