That Nvidia-hacking group went after T-Mobile but the FBI snagged their data before they could use it
"FFS, THAT AWS HAD [T-Mobile source code]!," one of the Lapsus$ hackers is meant to have said when they found out.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
The hacking group known as Lapsus$ has been linked to cyber attacks on Microsoft, Nvidia, and Samsung, among others, before core members of the group were said to have been arrested. Since then new text messages claimed to be from the hacking groups members suggest telecom company, T-Mobile, was also targeted and source code successfully stolen by the group. However, also that the FBI got involved and locked the group out of its own rented servers before they could do anything with the data.
Security blog KrebsOnSecurity, written by journalist Brian Krebs, says it has received logs of the Telegram discussions between the core members of Lapsus$, in which the hack of T-Mobile and the subsequent seizure are mentioned.
"FFS, THAT AWS HAD TMO SRC [T-Mobile source code] code!," a member of the group, known as White, is said to have mentioned in the aftermath of the seizure.
White was shortly thereafter arrested by City of London police, and is reported to be a 16-year-old from Oxford, UK. Other UK citizens, aged 15–21, were also arrested and alleged to be in connection with the group.
Lapsus$ is said to have preferred uploading stolen data to the cloud and rented servers to lower the risk of police raids on the members' homes from finding any of the stolen information. That plan didn't quite work out, however, as the remote content was scooped up by the FBI.
The hacking group is supposed to have tried to once again breach T-Mobile's systems and download the stolen data, however, found they were unable to regain access using the access tokens. These tokens were reportedly purchased online from the online equivalent of a man in a back alley opening a large trench coat, but the system may automatically revoke access to them when large repositories were downloaded many times in a short period.
"Cloning 30k repos four times in 24 hours isn’t very normal," White is reported to have said.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
T-Mobile has since confirmed the incident took place, but says that nothing of value was stolen by the hackers in this instance.
"Several weeks ago, our monitoring tools detected a bad actor using stolen credentials to access internal systems that house operational tools software," T-Mobile says. "The systems accessed contained no customer or government information or other similarly sensitive information, and we have no evidence that the intruder was able to obtain anything of value. Our systems and processes worked as designed, the intrusion was rapidly shut down and closed off, and the compromised credentials used were rendered obsolete."
Best CPU for gaming: The top chips from Intel and AMD
Best gaming motherboard: The right boards
Best graphics card: Your perfect pixel-pusher awaits
Best SSD for gaming: Get into the game ahead of the rest
Ultimately, it appears the arrested Lapsus$ members' downfall may have been accelerated by infighting and retaliatory actions from other nefarious actors. Original arrest reports, paired with Krebs on Security's, suggest that at various times White would fall out with a member of the group and make an attempt to expose their identity. While similarly White was doxxed by a group of fellow doxxers on a doxxing website he himself ran called Doxbin following his own doxxing of the site's users.
The original owner of that website, a cybercriminal by the handle of 'KT', is reportedly the person that leaked the private chat logs to KrebsOnSecurity. What goes around, comes around, I suppose. And in this case it appears that the FBI and police were the ones to come around knocking at the door eventually.

Jacob earned his first byline writing for his own tech blog, before graduating into breaking things professionally at PCGamesN. Now he's managing editor of the hardware team at PC Gamer, and you'll usually find him testing the latest components or building a gaming PC.

