Sunday, September 27, 00:37
Home security Hacker leaked online 20 GB of Intel internal documents!

Hacker leaked online 20 GB of Intel internal documents!

Intel is investigating reports that one hacker has leaked online 20 GB data derived from the chip giant, which appear to be related to source code, documents, and developer tools. An Intel spokesman said the files may have been leaked by someone who has access to Resource and Design Center, an online portal used by the company to give to business partners access in non-public technical documents for chipsets of. The company spokesman also added that everything indicates that a person gained access to this information and then downloaded and proceeded to leak this data.

A Swiss software engineer by name Till Kottmann published the documents, most of which are considered as "Confidential", stating that he got the material from a source who claims to have violated the company in May, while also noting that more details on this issue will be published soon. The information contained in the leak relates to Intel technology patents and chipsets, including specifications, product guides and internal manuals. Specifically, the data contained in the leak include the following:

  • Intel ME Bringup guides + (flash) tools + samples for various platforms
  • Kabylake (Purley Platform) BIOS Reference Codes and Sample Code for Kaby Lake
  • Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) sources
  • Silicon / FSP source code packages for various platforms
  • Various Intel deployment and debugging tools
  • Simics simulation for Rocket Lake S and possibly other platforms
  • Various roadmaps and other documents
  • Binaries for camera drivers made by Intel for the space company SpaceX.
  • Shapes, tools and firmware for the company's upcoming Tiger Lake processors.
  • Educational video FDK cable
  • Intel Marketing Material Templates (InDesign)

The good news is that the leak does not directly affect any customers or users of Intel processors. However, the fact that hackers have access to specific processor functions as well as the Bios programming code could be used in the future for even more serious attacks. Intel said in a statement that it was investigating the case and acknowledged that much of the technology secret information was currently in "inappropriate" hands.

Finally, it is worth noting that the same person has previously leaked the source code from dozens of companies, including Microsoft, Adobe, Johnson Controls, GE, AMD, Lenovo, Motorola, Qualcomm, Mediatek, Disney, Daimler, Roblox and Nintendo, with many reports pointing out that most of the information comes from incorrect configuration or exposed DevOps infrastructure.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

How to turn off private Wi-Fi MAC addresses

Apple has changed the way the iPhone and iPad connect to Wi-Fi networks starting with the iOS 14 and iPadOS 14 updates ....

Mac: See how to rename multiple files at once!

Many people have more difficulty renaming files on a Mac than renaming Windows. The Finder of ...

How can you control the performance of your Chromebook?

Many times users wonder about the performance of their computer and would like to be able to take a look at the system ...

How To Detect Hidden Surveillance Cameras With Your Phone

During our holidays or on business trips, we are forced to stay in hotels or Airbnb ....

How to play the hidden game of Android 11

Google usually includes the so-called "Easter Eggs" in every new version of Android that is released. And Android 11 is not ...
00:01:49

Ring: Amazon's new device is a drone with a security camera

Amazon is ready to launch a new Ring security camera mounted on top of a flying drone.

Software developers were very productive during the pandemic

The productivity of most software development teams increased during the Covid-19 pandemic crisis, according to a new study. But if you are ...

Cisco: 25 Serious Defects in IOS and IOS XE Software

Cisco has warned customers using IOS and ISO XE software to apply updates for 25 high-security vulnerabilities ...

The new Microsoft Edge feature will reduce memory and CPU usage

To improve memory and CPU usage on the Edge, Microsoft is developing a new feature called "Sleeping Tabs".

Microsoft: Removed 18 Azure AD apps controlled by Chinese hackers

Microsoft announced yesterday that it has removed 18 Azure Active Directory apps from the Azure portal, which were developed and used maliciously by ...