Samsung Electronics leak by Lapsus$ Group

March 4, 2022    Article    469 words    3 mins read

BREAKING: I looked inside the archives and you wouldn't believe what I found!

I hope you liked my MainStreamMedia title. The answer to that question (not really a question, though) is: the full source code for the Samsung S22 bootloader. Yeah.
Another leak, of Samsung Electronics and Qualcomm data, this time via Lapsus$ Group. It looks really juicy so far.
Part 1 contains a dump of source code and related data about
Security/Defense/Knox/Bootloader/TrustedApps and various other items.

Part 2 contains a dump of source code and related data about device security and
encryption related stuffs.

Part 3 contains various repositorys from Samsung Github. Including Mobile defense
engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby,
Smartthings, store, etc)

Part 1 and 2 also contain highly confidential data from Qualcomm and various other
samsung parters


The data was leaked by the Lapsus$ Group, the same group that leaked a 20GB file from NVIDIA few days ago, below is their original announcement.


Now leaking confidential Samsung source code! Our leak from breach includes:


-Source code for every Trusted Applet (TA) installed on all samsung device's
TrustZone (TEE) with specific code for every type of TEE OS (QSEE, TEEGris etc)

-Algorithms for all biometric unlock operations, including source code that
communicates directly with sensor (down to the lowest level, we're talking
individual RX/TX bitstreams here)

-Bootloader source code for all recent Samsung devices, including Knox data
and code for authentication.

-Various other data, confidential source code from Qualcomm.


-Samsung activation servers source code (for first-time setup)

-SAMSUNG ACCOUNTS FULL SOURCE CODE! Including Authentication, Identity, API,
Services, and many more that wouldn't fit here!

-Various other data.

As always, enjoy! ;)


According to one of the group members:

samsung had MAC auth and IP auth
and MFA
but we still somehow passed it


Magnet Link:


Here is a link to the original torrent file, SHA-256 of the file is 057e5cef76d1b3ad41957f2ae023aa53151b8f8c59ffec12257075320101c98c (make sure you compare it). The torrent is v2 and won’t open in clients that don’t support v2 torrents (like Transmission).


There is one text file (README.txt) and three .7z archives (Samsung Electronic - part {1,2,3}.7z, I am still parsing the archives (it’s about 189GB of data after all) so stay tuned for more info.

If you’re interested in a FULL tree listing of every directory (no files) in the archives, check this out. Tree listing of the archives are below (limited to X levels deep because the full listings are obviously huge).

Samsung Electronic - part 1.7z

Size: 96,200,220,499 bytes

Samsung Electronic - part 2.7z

Size: 32,945,969,177 bytes

Samsung Electronic - part 3.7z

Size: 74,796,769,674 bytes

Looks like full source code for various Samsung Android components, confidential documentation, roadmaps, etc got leaked. Cool-i-o.