A leaker has posted a repository link to Twitter that contains up to 20GB of Intel’s intellectual property (IP) including source code, processor generation documentation, and more. The breach was reportedly made earlier this year by an anonymous source and the hacker has termed the dump an “Intel exconfidential Lake Platform Release”.
The tweet says that information obtained from the breach is extremely confidential and is under Non-Disclosure Agreements (NDA) or is classified as Restricted. The individual posted a list of contents in the breached data, adding that “jucier and more classified stuff” will be posted in the future. Contents in the list include “Kaby Lake BIOS reference code, Binaries for Camera drivers Intel made for SpaceX” and more. There is also information on upcoming processor generations, which could be damaging considering the implications of the code falling into the wrong hands.
The Twitter user also hinted at potential “backdoor” information being present in the files obtained by breaching Intel’s systems. Zip folders that are protected can reportedly be opened by using passwords like “Intel123” or “I accept” according to the information in the documents. It is not clear if the references relate to solutions for the backdoor, or active threats and vulnerabilities.
Though the data and files may not make sense for most users, it could be misused by bad actors to dig through any potential vulnerabilities. Considering that the list contains roadmaps and references of unannounced processor generations, the information poses a security risk since the IP could be used to craft malware that leverages any possible loopholes. The folks over at TomsHardware reached out to Intel for comment and the company has said that it is “investigating the situation”.
Though we link to the tweet which also contains the links to the repository in the thread, it is best to not access unknown files owing to any security risks.
Till Kottmann, a Swiss IT consultant, posted on Twitter a link to a file sharing service today that contains what an anonymous source claims is a portion of Intel's crown jewels: A 20GB folder of confidential Intel intellectual property. The leaker dubbed the release the "Intel exconfidential Lake Platform Release ."
Update: Intel has responded to Tom's Hardware with an official statement:
"We are investigating this situation. The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. We believe an individual with access downloaded and shared this data."
Intel's Resource and Design Center is a website dedicated to providing the company's partners with NDA documentation for product integration purposes. Reports are also cropping up that some of the files are marked with NDA license agreements to "Centerm Information Co. Ltd., a Chinese company established and existing under the laws of the People's Republic of China," meaning this company could have been also hacked.
The folder appears to have been originally posted by an anonymous source that claims more is coming soon, and while we don't know the exact specifics of the folder's contents, we have verified that it does exist. In fact, the title of many of the documents do correlate to the list of purported information posted by the leaker:
-Intel ME Bringup guides + (flash) tooling + samples for various platforms
-Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history)
-Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES
-Silicon / FSP source code packages for various platforms
-Various Intel Development and Debugging Tools
-Simics Simulation for Rocket Lake S and potentially other platforms
-Various roadmaps and other documents
-Binaries for Camera drivers Intel made for SpaceX
-Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform
- (very horrible) Kabylake FDK training videos
-Intel Trace Hub + decoder files for various Intel ME versions
-Elkhart Lake Silicon Reference and Platform Sample Code
-Some Verilog stuff for various Xeon Platforms, unsure what it is exactly.
-Debug BIOS/TXE builds for various Platforms
-Bootguard SDK (encrypted zip)
-Intel Snowridge / Snowfish Process Simulator ADK
-Various schematics
-Intel Marketing Material Templates (InDesign)
-Lots of other things
Kottman, who has been behind other data dumps of proprietary information in the past, claims the hacker "breached" Intel, which the company denies. Kottman also said the files were obtained earlier this year, adding "most of the things here have NOT been published ANYWHERE before and are classified as confidential, under NDA or Intel Restricted Secret." The source says more files will be shared soon, and "the future parts of this leak will have even juicier and more classified stuff."
Interestingly, Kottman also notes "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was acquired from Intel."
The posts encourage downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.
The link is being widely distributed on Twitter, but it might be best to exercise caution – downloading any file from an untrusted source is always a risk.
Heng my password is password1234