Monday, April 28, 2025
HomeCyber AttackThreat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Published on

SIEM as a Service

Follow Us on Google News

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to everything from consumer electronics to critical defense systems, are under siege from sophisticated cyber threats.

These firms design, manufacture, and sell semiconductors, crucial elements with conductivity between that of a conductor and an insulator, and are prime targets for cybercriminals due to their strategic importance.

Darknet Markets and Zero-Day Exploits

Recent reports indicate that these companies are increasingly becoming targets on the darknet, where zero-day vulnerabilities are traded like currency among cybercriminals.

- Advertisement - Google News

Zero-day vulnerabilities, which are flaws known to attackers but not yet to the software’s creator, represent a lucrative market.

According to DarkOwl, these vulnerabilities, especially those in Industrial Control Systems (ICS/SCADA), firmware, or chip toolchains, can be sold for vast sums, particularly when they compromise critical infrastructure.

For instance, vulnerabilities in ASML lithography systems, critical for semiconductor manufacturing, and in ARM-based architectures have been exploited in targeted attacks.

Ransomware and Supply Chain Attacks

The semiconductor sector has not been immune to ransomware. Groups like LockBit, BlackCat (ALPHV), and RansomEXX have engaged in highly calculated attacks, encrypting systems or stealing sensitive design data with threats to leak them unless hefty ransoms are paid.

A notable incident involved a TSMC supplier attacked by LockBit, with a ransom demand reaching $70 million.

Moreover, attackers are infiltrating supply chains at a hardware level.

There have been instances where malicious firmware was embedded into chips before deployment, posing risks not only to the semiconductor manufacturers but also to downstream users relying on these components.

As these attacks escalate, semiconductor companies are bolstering their defenses.

The acquisition of zero-day exploits and the monitoring of darknet forums for any mention of company assets or stolen credentials has become essential.

Real-world cases illustrate the severity:

  • NVIDIA Breach (2022): The Lapsus$ group stole proprietary GPU designs and employee credentials, leading to unauthorized code-signing certificates and potential malicious driver development.
  • Intel & AMD Firmware Leaks: Hackers have leaked engineering documentation and firmware signing keys on underground forums, which were later exploited for BIOS-level attacks.

Semiconductor firms are now adopting a multi-layered security approach.

This includes monitoring darknet spaces like RAMP, Genesis Market, and BreachForums, where initial access brokers sell compromised credentials that offer cybercriminals an entry point into corporate networks.

In conclusion, the semiconductor industry’s proactive stance in cybersecurity is crucial as it continues to drive technological advancements, facing an ever-evolving landscape of cyber threats.

Understanding and preempting operations on the darknet aids in safeguarding intellectual property and maintaining business continuity amidst these sophisticated cyber assaults.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...