Intel's Habana Labs Reportedly Hacked

As reported by Calcalist, a hacking group alleges that it has used Pay2key malware to gain access to Intel's Habana Labs in Israel. The purported attack follows a wave of recent ransomware attacks in Israel. As proof of the attack, the hackers have shared via Twitter what appears to be a snippet of Habana Labs code, although it's notable that the snippet of text could be easily faked, along with a domain account and domain zone information. We've reached out to Intel for further comment and will update as necessary. 

According to Check Point Research, Pay2Key has emerged as a particularly potent variant of ransomware that can gain control and encrypt an entire network in an hour. The perpetrators generally ask for ransom that ranges from $110,000 to $140,000, paid in Bitcoin. It's unclear if the group behind the purported attack has demanded a ransom from Intel. 

The Pay2Key ransomware has reportedly been behind a recent spate of attacks against Israeli companies, but the full scope of the operation is unknown. We'll update as we learn more.   

Paul Alcorn
Editor-in-Chief

Paul Alcorn is the Editor-in-Chief for Tom's Hardware US. He also writes news and reviews on CPUs, storage, and enterprise hardware.

  • FunSurfer
    Why isn't there a UAC option in Windows 10 for encrypting files? There should be an option to never allow file encryptions, or encryption can be allowed only with administrator permission or by clicking "yes" on the UAC prompt with the mouse that directly connected to the PC in which the files are targeted to encrypt
    Reply
  • setx
    FunSurfer said:
    Why isn't there a UAC option in Windows 10 for encrypting files? There should be an option to never allow file encryptions, or encryption can be allowed only with administrator permission or by clicking "yes" on the UAC prompt with the mouse that directly connected to the PC in which the files are targeted to encrypt
    Do you even understand what is going on? They are not using your OS encryption (that might even has security holes for easier decryption) but their own code and just rewriting the files.
    Reply
  • nofanneeded
    This cant be done without insiders.
    Reply