More information from Nvidia’s recent cyber breach has started to emerge, which would reveal details regarding the company’s upcoming GPUs.
Nvidia also publicly acknowledged the cybersecurity incident, confirming that “proprietary information” was indeed leaked online.
As reported by VideoCardz, an individual sent in several photos detailing the Ada, Hopper, and Blackwell GPU architectures. These codenames have all been previously reported to represent Nvidia’s next-gen graphics cards for gaming and data centers.
The source of the images has not yet been verified, but it’s likely that whoever sent them found them through the 1TB hack. That’s an absolutely massive amount of data, so the leaks of the breach will begin naturally to appear online. Nvidia’s admission that “proprietary information from our systems” has been taken by hackers and the fact that they have “begun leaking it online” gives credence to the validity of this particular leak.
In any case, this specific leak seems to confirm that Ada is indeed the successor to the current generation Ampere architecture that powers Nvidia GPUs. AD102, AD103, AD104, AD106, AD107 and AD10B have all been mentioned. However, the exact configurations of these future GPUs have yet to be revealed.
Anticipation is mounting for the Ada-based GeForce RTX 40-series video cards. Although they may share similarities with the current Ampere architecture, they are still poised to offer noticeable performance improvements. Specifically, it would double the teraflops (TFLOPS) count of the 3090 Ti.
Elsewhere, another screenshot shared with VideoCardz seemingly confirms Hopper will be the name behind next-gen GPUs powering data centers, with two models, GH100 and GH202, cited in the data. Meanwhile, another purported codename for Nvidia’s accelerated computer cards, Blackwell, has been listed alongside the reference for two versions: GB100 and GB102.
Finally, Nvidia confirmed that its security systems had been breached in a statement, as reported by VideoCardz:
“On February 23, 2022, NVIDIA became aware of a cybersecurity incident that impacted computing resources. Shortly after discovering the incident, we further bolstered our network, hired cybersecurity incident response experts, and briefed law enforcement.
We have no evidence that ransomware is deployed on the NVIDIA environment or that it is related to the Russian-Ukrainian conflict. However, we are aware that the threat actor took employee credentials and certain NVIDIA proprietary information from our systems and began leaking them online. Our team is working on analyzing this information. We do not anticipate any disruption to our business or our ability to serve our customers as a result of the incident.
Security is an ongoing process that we take very seriously at NVIDIA – and we invest daily in the protection and quality of our code and our products.
The implications of this unprecedented hack are far-reaching. As mentioned, the amount of data stolen is 1TB. LOPSUS$, the group claiming to be responsible for the attack, said it extracted the “most important items”, ranging from documentation, private tools, schematics, drivers, firmware, etc. Despite Nvidia’s alleged revenge in the form of its own hack, South America-based LOPSUS$ pointed out that it had created a backup.
LOPSUS$ started leaking yesterday which obviously gave rise to today’s story about Team Green’s GPU plans. Looking ahead, the hacking group claims that it got the algorithm behind Nvidia’s crypto mining limiter for its 30-series graphics cards. existing light hash rates, otherwise it will release folders containing sensitive data it has in its possession.