
Part 3 contains various repositories from Samsung Github: mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby, Smartthings, store).Part 2 contains a dump of source code and related data about device security and encryption.Part 1 contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items.Included in the torrent is also a brief description for the content available in each of the three archives: Lapsus$ split the leaked data in three compressed files that add to almost 190GB and made them available in a torrent that appears to be highly popular, with more than 400 peers sharing the content. The extortion group also said that it would deploy more servers to increase the download speed.

If the details above are accurate, Samsung has suffered a major data breach that could cause huge damage to the company.

full source code for technology used for authorizing and authenticating Samsung accounts, including APIs and services.source code for Samsung’s activation servers.bootloader source code for all recent Samsung devices.algorithms for all biometric unlock operations.hardware cryptography, binary encryption, access control) source code for every Trusted Applet (TA) installed in Samsung’s TrustZone environment used for sensitive operations (e.g.Shortly after teasing their followers, Lapsus$ published a description of the upcoming leak, saying that it contains “confidential Samsung source code” originating from a breach. In a note posted earlier today, the extortion gang teased about releasing Samsung data with a snapshot of C/C++ directives in Samsung software.

The leak comes less than a week after Lapsus$ released a 20GB document archive from 1TB of data stolen from Nvidia GPU designer. The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics, the South Korean giant consumer electronics company.
