Thursday, July 7th 2022
AMD is Investigating a Potential 450 Gb Data Breach
RansomHouse, a newly established group aimed at monetizing stolen data, claims to own more than 450 Gb of data coming from AMD. The RansomHouse group is structured as the middleman and makes sure that hackers and victims negotiate to get the funds to hackers and data back to victims. It is claimed that the leaked AMD data contains network files, system information, and AMD passwords. This could be a very dangerous data breach, as inter-company passwords are used to access confidential files and personal information. The group notes that they own 450 Gb or gigabits of data, which translates into 56.25 GB or gigabytes of stolen data. We are not yet sure if the Gb notation is misspelled. It is claimed that AMD's poor security practices like using "password" passwords lead to the data breach, and no special ransomware software was used.
Tom's Hardware reached out to AMD for a statement, and got the following response:
Source:
Tom's Hardware
Tom's Hardware reached out to AMD for a statement, and got the following response:
AMD Representative for Tom's HardwareAMD is aware of a bad actor claiming to be in possession of stolen data from AMD. An investigation is currently underway.
46 Comments on AMD is Investigating a Potential 450 Gb Data Breach
Thanks for sharing
Donaudampfschifffahrtselektrizitätenhauptbetriebswerkbauunterbeamtengesellschaft
Grundstücksverkehrsgenehmigungszuständigkeitsübertragungsverordnung
Donaudampfschifffahrtsgesellschaftskapitänswitwe
To be fair, most of these words are invented by buerocrats, not used by the average joe. Funny part is the buerocrats also create a shortened version of these words for their law books, and everyone then has to google what it actually means. F.e. "Telekommunikationsüberwachungsverordnung" = § 1 "TKÜV"
You're probably right about the word combos, but even three words is a LOT of guesses. I've read that a native English speaker will know ~40 000 words (but use about half with some frequency), while a dictionary can contain 300 000 entries (though not all of those are "words" in a strict sense. So let's go with common words - two is 20 000^2, or 400 million guesses. That's not really secure, just a tad more than a six-letter password with only the 26 English non-capitals. But three? 8 trillion combinations. Six? 6.4*10^24 combinations. That's... 6 400 000 000 000 000 000 000 000 possible combinations. That sounds like a "maybe before the heat death of the universe" type of situation. (And we're still talking all lower case!) So I doubt any brute-force scripts include six-word combinations, unless they're using massively reduced word lists.
In a nutshell, if I were to write such a tool, I would add at least some heuristics, looking for low-hanging fruits, in addition to brute forcing.
It would take a computer about
4 quintillion years
to crack your password
so good luck hackin me wifi pword