Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Intel Businesses

Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors (tomshardware.com) 78

FallOutBoyTonto writes: A leaker today posted on Twitter a link to a file sharing service that contains what an anonymous source claims is a portion of Intel's crown jewels: A 20GB folder of confidential Intel intellectual property. The leaker dubbed the release the "Intel exconfidential Lake Platform Release ;)" The folder has been posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:

Intel ME Bringup guides + (flash) tooling + samples for various platforms
Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
Silicon / FSP source code packages for various platforms
Various Intel Development and Debugging Tools
Simics Simulation for Rocket Lake S and potentially other platforms
Various roadmaps and other documents
Binaries for Camera drivers Intel made for SpaceX
Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
(very horrible) Kabylake FDK training videos
Intel Trace Hub + decoder files for various Intel ME versions
Elkhart Lake Silicon Reference and Platform Sample Code
Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
Debug BIOS/TXE builds for various Platforms
Bootguard SDK (encrypted zip)
Intel Snowridge / Snowfish Process Simulator ADK
Various schematics
Intel Marketing Material Templates (InDesign)

This discussion has been archived. No new comments can be posted.

Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors

Comments Filter:
  • by elzurawka ( 671029 ) on Thursday August 06, 2020 @03:29PM (#60373971)

    Anyone got a magnet link?

    • Anyone got a magnet link?

      I was just thinking this would be up in i2p space already. Even with a proxy/VPN this would be dangerous to host on clearnet.

      There will be a lot of pressure from law enforcement on this one. I'd suggest folks stay away from downloading this on any network.

      Though when I host my IT meeting with the CEO and VP tomorrow we will have a long conversation about "Intel123"....

      • Comment removed based on user account deletion
    • by gillbates ( 106458 ) on Thursday August 06, 2020 @06:40PM (#60374753) Homepage Journal

      Why would you bother? Seriously - the description sounds like some various & sundry documents you'd get for signing an NDA & development agreement with Intel. Wouldn't surprise me if some of it is already available through their website. Even if the files had proprietary Intel trade secrets, without a chip foundry, supply chain, and a large customer base, they'd be worthless.

      While Intel may not publish all of their trade secrets, the issues with their cpus have come from publicly available knowledge, not the discovery of something they tried to hide. Of all the chip makers, they seem to be most open and forthcoming with details of how their products work, with the possible exception of AMD.

  • by Anonymous Coward
    Any of that that would be about Intels' verison of JTAG access to silicon won't really be much help to you without their proprietary blue box interface, the software that goes with it, and of course their security system to unlock things in the silicon, which naturally exists only on their enterprise intranet and requires you to have system accounts.
    Also from some of the descriptions sound like validation platforms and not even things like reference designs necessarily.
    Also for those who don't know 'produ
    • Engineering samples turn up on eBay. Wonder if they're locked down as well...

      • by Anonymous Coward
        They're not supposed to. All those are supposed to be accounted for. Of course having been in charge of silicon inventory in a previous life I can tell you that shit goes missing all the time because not everyone maintains a clear chain of custody of high-value IP, and people get tongue-lashed for it and I'm sure it dings them at review time but no one gets fired or jailed over it. Of course if Intel acquired some of those from Ebay the serial numbers are engraved right on them and burned into the silicon i
  • Intel123?! Oh great, now I have to change my password!

  • by Ostracus ( 1354233 ) on Thursday August 06, 2020 @04:12PM (#60374129) Journal

    Wonderful. Now I can go out and create my own CPUs to compete with Intel.

    • Sure, all you need is a full set of machines from ASML, at $10-100 million *each*, and more brains than the Solvay conference. Cause I heard TSMC is full.

      Unless ... there may be some capacity available, soon, at Intel! :D

    • by Luckyo ( 1726890 )

      Not really, but you can probably backdoor some Intel PCs while they're shut down but have ATX power on via IME exploits. Do servers use it too? If so, that might be an actual disaster for Intel.

      Microsoft already demonstrated that having system wide spyware that actively sends data back is not a deal breaker for most people.

  • Based on titles, about half of that stuff should have been public downloads in the first place.

  • Before the goody two shoes come out of their holes to signal virtue, and censor it away so we don't get to do the evil acts, in the name of not harming the evil doer.

    • It probably wouldn't hurt to make backups of all of your data on any Intel-powered devices, since if there turn out to be remotely-exploitable backdoors in this breach, you're probably going to need them very soon...
  • by EvilSS ( 557649 ) on Thursday August 06, 2020 @04:52PM (#60374261)
    This leak is from Intel's partner/customer portal: "The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. " so not from some internal secret trove, just partner NDA stuff. As for backdoors, yea, it mentions it but.... "The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code."

    So interest level: 7, clickbait level: 11
  • https://www.youtube.com/c/Expl... [youtube.com]

    (In case you were wondering, the short FAQ: Yes, it is an awesome channel. Yes, it looks like a crack lab shed. Yes, the cops were there. No, apparently everything he does in legal in Australia. Yes, I love you, Australia!)

  • "encrypted sdk" lol not for long
  • Anyone thought about this yet?

    Nevermind pointing at Intel's private parts,

    just alter the Minix in there at will, to turn it into an ally, with many cool features, full Linux integration,

    and an NSA honeypot that lets us plant stuff on *their* box if they take the bait. :)

  • accusing Huawei of backdooring their products, with no proof....
  • The magnet link that was posted earlier was deleted.

    • Yes, it was!!
      ,br> For anyone that care about random hashes, try: 38F947CEADF06E6D3FFC2B37B807D7EF80B57F21. I promise (mostly) that you won't be Rick Rolled in 8K defintion.
    • (Assuming my previous post will also shortly disappear.)

      Also: "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was aquired from Intel."

      Reddit i4x8jn also has some info
    • by thedarb ( 181754 )

      Search btdig.com.

  • So 20GB is still massive in 2020? Given there were binaries and all..

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...