Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors (tomshardware.com) 78
FallOutBoyTonto writes: A leaker today posted on Twitter a link to a file sharing service that contains what an anonymous source claims is a portion of Intel's crown jewels: A 20GB folder of confidential Intel intellectual property. The leaker dubbed the release the "Intel exconfidential Lake Platform Release ;)" The folder has been posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:
Intel ME Bringup guides + (flash) tooling + samples for various platforms
Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
Silicon / FSP source code packages for various platforms
Various Intel Development and Debugging Tools
Simics Simulation for Rocket Lake S and potentially other platforms
Various roadmaps and other documents
Binaries for Camera drivers Intel made for SpaceX
Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
(very horrible) Kabylake FDK training videos
Intel Trace Hub + decoder files for various Intel ME versions
Elkhart Lake Silicon Reference and Platform Sample Code
Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
Debug BIOS/TXE builds for various Platforms
Bootguard SDK (encrypted zip)
Intel Snowridge / Snowfish Process Simulator ADK
Various schematics
Intel Marketing Material Templates (InDesign)
Intel ME Bringup guides + (flash) tooling + samples for various platforms
Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
Silicon / FSP source code packages for various platforms
Various Intel Development and Debugging Tools
Simics Simulation for Rocket Lake S and potentially other platforms
Various roadmaps and other documents
Binaries for Camera drivers Intel made for SpaceX
Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
(very horrible) Kabylake FDK training videos
Intel Trace Hub + decoder files for various Intel ME versions
Elkhart Lake Silicon Reference and Platform Sample Code
Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
Debug BIOS/TXE builds for various Platforms
Bootguard SDK (encrypted zip)
Intel Snowridge / Snowfish Process Simulator ADK
Various schematics
Intel Marketing Material Templates (InDesign)
Link to the torrent? (Score:4, Funny)
Anyone got a magnet link?
Re: (Score:3)
Wait I thought you blamed it on the first level technician who had access to all this stuff. It's obviously their fault!!
Re: (Score:2)
Wait I thought you blamed it on the first level technician who had access to all this stuff. It's obviously their fault!!
That fella is a "shareholder" of sorts in this. You have to choose from that list for the real culprit here.
Remember, we do not have to provide [any] evidence lest we *cough* *cough*, "reveal our sources & methods."
Re: (Score:2)
"Remember, we do not have to provide [any] evidence lest we *cough* *cough*, "reveal our sources & methods.""
See now you've got me mixed up because I agree backdoors by Intel are almost certainly NSA and/or CIA BS at work but pretty much everything in recent history you might be alluding to with this quote is an example of actual fuckery on the part of those places.
Anyone involved in security could tell you that we in a state of active warfare with China and Russia in particular and most of the pot stir
Re: (Score:2, Troll)
I'm in the business and Russia and China aren't the problems I have to deal with day to day - it's stupid shit like this from our Allies.
Re: (Score:2)
Lucky you. I on the other hand have to make sure to be up on the latest Chinese attacks, bots, worms, etc flooding everything. They are constantly attacking infrastructure and attempting to infect everyone but not just digital networks. The Chinese are huge on information, they run a heavy information, disinformation, propaganda, and information warfare campaigns to protect their interests both to politically cover up and dismantle their crimes but also to shape global opinion on topics like democracy and s
Re: (Score:2)
sure, and you can't ... *cough* *cough*, "reveal our sources & methods."
Re: (Score:2)
Most of this isn't secret at all. The five eyes intelligence alliance is known, we have information sharing treaties and the fact that information relating to crimes with regard to Iran and Chinese interests was shared with allies has already been made public by some of those governments. Just because YOU haven't seen it doesn't mean it hasn't been corroborated by others.
As for Chinese and Russian attacks, plenty of that information is public. Watch advisories from FireEye for instance and even your feed on
Re: (Score:2)
oh, you mean those eyes: https://en.wikipedia.org/wiki/... [wikipedia.org]
pot calling kettle black, because pot 'has values'. cool story.
i agree chinese methods are brutal but tbh in the big picture i trust chinese power as little as north american with their 'liberal' rhetoric. it looks pretty clear to me that this is about power struggles, economic war, opinion control and propaganda, not fighting crime. i doubt it is going to end well.
Re: (Score:2)
"power struggles, economic war, opinion control and propaganda, not fighting crime"
I won't disagree with that. But free speech, individual freedom, and democracy are the pinnacle of mankind's development in government in the past thousand years. One side is all about convincing people that it wouldn't be such a big deal to give up on those concepts and that they are the tool of "old white men" along with tossing out all the melting pot concepts that allowed a young country like the United States to grow and
Re: (Score:1)
Well at least their quality is better then the American slave labour camps produce. Looking at an American slave labour produced trailer a while back, they couldn't even weld 2 pieces of metal together straight.
Slave labour is bad whether it is China or America and giving some minority a choice of pleading guilty or gambling that without a decent lawyer, he can beat the charges doesn't really improve things. There's a reason you guys have close to 1% of your population in prison and I don't think it is beca
Re: Link to the torrent? (Score:2)
Wait, I thought maneaters^Wmanagers justified their usurious salaries with them "taking responsibility"...!
You mean I can make lots of money on the backs of others with no risks too?!
Re: (Score:2)
6. NSA-mandated backdoor.
Re:Link to the torrent? (Score:4, Insightful)
NSA/CIA mandated backdoor with the source of the leak almost certainly being hostile foreign state hackers from China/Russia. Yes these kind of backdoors are abused to spy on you whether you are us/friend/ally/enemy and in the first three cases also to defend you from the last country who are most definitely hostile. The post you are replying to might be an asshat or could quite easily be a disinformation sockpuppet for one of those parties... either way it is saying what they would want said toward the beginning of the discussion. This is still oddly a choke point for some well placed technology people so sowing some level of division here is still useful.
Sorry was that too honest and way too confusing and grey? We good, they bad.
Re: (Score:1)
It's always Russia/China until we get proof and it ends up being murdered DNC Staffers and retired diplomats eh?
Re: (Score:3)
If China or Russia got hold of an NSA/CIA mandated backdoor, you can be sure the last thing they would be doing is telling anybody they have it.
Re: (Score:3)
Maybe retaliation for Trump's attacks on Huawei and other Chinese companies. Leak some really damaging stuff on American firms.
Re: (Score:2)
Disgruntled activist employee?
Re: (Score:1, Troll)
anything to distract from the contents of the documents - like they distracted gullible people from Hillary's email contents.
Re: (Score:1)
More like how they distracted people from DNC corruption in the primary. The Hillary emails themselves served as a convenient distraction from that. Hillary is out of office but the same cabal is running the Democratic party.
Re: (Score:1)
Did you miss what Hillary's emails showed? Completely blew apart the Syria narrative and proved she was profiting personally from the conflict.
I found that more important than DNC political corruption - that's a domestic problem - not a crimes against humanity problem.
Re: (Score:2)
"I found that more important than DNC political corruption - that's a domestic problem - not a crimes against humanity problem."
No crimes commited by one individual could outweigh overt corruption in one of the major parties... especially the party which portrays itself as being about sunshine, rainbows, and fairness. Yes, it's a domestic problem... as in the democratic process for the entire country is corrupted. The DNC corruption encompassed most of the major media as well and that is a big deal.
These th
Re: (Score:2)
Given this doesn't seem political in any way, it seems unlikely that a state actor would be involved.
But I guess it's still useful as a strawman to distract people from instances where a state actor is a credible suspect.
Re: (Score:2)
Production of semi-conductors is political. Whoever controls that market has access to the firmware controlling every device on Earth.
China would love to see that industry under their umbrella.
Re: (Score:2)
There's the key point there - potential fuckery vs actual fuckery. I'll keep an eye on the potential, but not at the cost of ignoring the actual.
Re: (Score:2)
Re: (Score:3)
Anyone got a magnet link?
I was just thinking this would be up in i2p space already. Even with a proxy/VPN this would be dangerous to host on clearnet.
There will be a lot of pressure from law enforcement on this one. I'd suggest folks stay away from downloading this on any network.
Though when I host my IT meeting with the CEO and VP tomorrow we will have a long conversation about "Intel123"....
Re: Link to the torrent? (Score:1)
Intel is fucked, aren't they?
Officially full and thoroughly fucked.
(No hate. Just observation.)
And you can't tell me this leak isn't caused by employees being disgruntled due to the infighting and civil war that's apparently currently going on at Intel due to them scrambling to get back on track.
Re: (Score:3)
While I have no more information than you do, it does seem awfully coincidental that just when we are putting the screws to Huawei and trying to convince the world that they are a conduit for the Chinese government to spy that the last major chipmaker that manufactures mostly within the USA has documents leaked that show the rest of the world that they have backdoors that allow the US to Spy....
Tit for Tat.
Re: (Score:3)
Always going to be insiders. How much does the damage cost, often billions of dollars, and that leaves a lot for bribes. Any competitor to Intel will benefit massively by this and so the incentives to pay for the damage to occur are high, especially during harsh economic times. Often dangerous to pass the information privately but sneakily publish it and those who wanted it can access it and of course the target computer is hugely economically damaged by it.
Private for profit corporations are more likely t
Re: (Score:3)
You can bet the media and government PR will be spinning this as hard as they can with unsubstantiated accusations. I wonder if it will be illegal to look at these documents (like government employees were banned from reading Wikileaks).
While we have this idiot ideal of 'surveillance good and we won't get caught' that seems to pervade the upper (and aged) echelons of the national security apparatus we're always going to have people on the ground seeing just how deluded leadership is and how much damage they
Re: (Score:2)
It's not about how many proxies you're behind.
It's about who's back there with you.
Re: (Score:3)
Exactly, it's about whether you have intel inside!
Re: (Score:2)
Nicely done.
Re: (Score:3)
Why would you bother? (Score:5, Interesting)
Why would you bother? Seriously - the description sounds like some various & sundry documents you'd get for signing an NDA & development agreement with Intel. Wouldn't surprise me if some of it is already available through their website. Even if the files had proprietary Intel trade secrets, without a chip foundry, supply chain, and a large customer base, they'd be worthless.
While Intel may not publish all of their trade secrets, the issues with their cpus have come from publicly available knowledge, not the discovery of something they tried to hide. Of all the chip makers, they seem to be most open and forthcoming with details of how their products work, with the possible exception of AMD.
Re:Why would you bother? (Score:4, Insightful)
I somewhat doubt you would be provided with details of NSA mandated backdoors in Intel firmware under the developer NDA
Some of that wouldn't be useful (Score:2, Informative)
Also from some of the descriptions sound like validation platforms and not even things like reference designs necessarily.
Also for those who don't know 'produ
Re: (Score:2)
Engineering samples turn up on eBay. Wonder if they're locked down as well...
Re: (Score:1)
Re: (Score:2)
Just checked and there are 87 for sale!
Oh crap (Score:2)
Intel123?! Oh great, now I have to change my password!
Re:Oh crap (Score:5, Funny)
Re: (Score:2)
In Soviet Russia... password changes YOU.
Re: (Score:1)
Re: (Score:2)
What is it with people being butthurt when we hear about all the STUPID stuff being done without our support, permission or knowledge in the cybersecurity sphere?
Oh - the people who believe government Governs us, not Governs FOR us.
I prefer to know what idiot antics the hardware vendors are cooperating with, gives me at least a chance of performing my duties and keep my client's information secure.
Leaky Distractions. (Score:5, Funny)
Wonderful. Now I can go out and create my own CPUs to compete with Intel.
Re: Leaky Distractions. (Score:2)
Sure, all you need is a full set of machines from ASML, at $10-100 million *each*, and more brains than the Solvay conference. Cause I heard TSMC is full.
Unless ... there may be some capacity available, soon, at Intel! :D
Re: (Score:2)
Not really, but you can probably backdoor some Intel PCs while they're shut down but have ATX power on via IME exploits. Do servers use it too? If so, that might be an actual disaster for Intel.
Microsoft already demonstrated that having system wide spyware that actively sends data back is not a deal breaker for most people.
Funny thing (Score:2)
Based on titles, about half of that stuff should have been public downloads in the first place.
Please, everyone, make a backup! Stat! (Score:1)
Before the goody two shoes come out of their holes to signal virtue, and censor it away so we don't get to do the evil acts, in the name of not harming the evil doer.
Re: (Score:2)
A lot more boring than the headline makes out (Score:5, Informative)
So interest level: 7, clickbait level: 11
I've got the right YT channel for Intel's internal (Score:1)
https://www.youtube.com/c/Expl... [youtube.com]
(In case you were wondering, the short FAQ: Yes, it is an awesome channel. Yes, it looks like a crack lab shed. Yes, the cops were there. No, apparently everything he does in legal in Australia. Yes, I love you, Australia!)
Re: I've got the right YT channel for Intel's inte (Score:2)
Goddammit, Slashdot cut off the channel name!
Explosions&Fire2 [youtube.com]
LOL (Score:1)
Hey, this will let is secure the IME!! (Score:2, Troll)
Anyone thought about this yet?
Nevermind pointing at Intel's private parts,
just alter the Minix in there at will, to turn it into an ally, with many cool features, full Linux integration,
and an NSA honeypot that lets us plant stuff on *their* box if they take the bait. :)
Re: Hey, this will let is secure the IME!! (Score:2)
us! not is!
Thank God I'm not stating my side in an international conflict, ... Jesus Christ! :D
Re: Hey, this will let is secure the IME!! (Score:1)
I will just let your comment stand, to show what type of people get to vote / get mod points, and to point at you and laugh.
Get a therapy for your triggers, mate. :)
Re: (Score:2)
Hey Anon - doesn't sound like you work in the industry or have been playing whack-a-mole trying to close 'bugs' since Snowden gave us a glimpse of what is going on.
You know what's worse than someone virtue signalling? People who dismiss what is actually going on and downplaying it.
Re: (Score:2)
Re: Hey, this will let is secure the IME!! (Score:1)
Nice! Didn't know Linux fit inside a thousandths of a bit!
And yet, we have the US (Score:2)
Uh oh (Score:2)
The magnet link that was posted earlier was deleted.
Re: (Score:2)
,br> For anyone that care about random hashes, try: 38F947CEADF06E6D3FFC2B37B807D7EF80B57F21. I promise (mostly) that you won't be Rick Rolled in 8K defintion.
Re: (Score:2)
Also: "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was aquired from Intel."
Reddit i4x8jn also has some info
Re: (Score:2)
Thanks for the password!
Re: (Score:2)
Search btdig.com.
So 20GB is still massive in 2020? (Score:2)
So 20GB is still massive in 2020? Given there were binaries and all..