AMD has Confirmed that a Hacker has Stolen Files on Graphics Products

AMD Processor

AMD has reported that a hacker has stolen data relating to some of its graphics goods, but the organization claims it is not too worried about the effects of the breach.

A hacker who uses the online alias “Palesa” appears to have accessed source code files linked to many AMD graphics processing units (GPUs), including the Navi 10 architecture used in several Radeon RX 5000-series graphics cards, the new Navi 21, and Arden. Arden is the code word for the GPU that will drive Microsoft’s new Xbox Series X consoles.

Palesa said that the data collected from a computer operated by AMD, not from a contractor. The hacker expects to get some money for the files, either from AMD or from someone else.

Palesa claims to have already received some “good offers in bitcoin” for the files — the hacker says the offers range between $50,000 and $100,000 — but they are waiting for “AMD to speak on this.”

AMD identified the stolen data as a statement released on its website, “test files related to a subset of our current and future graphics products.” The company said it was contacted by someone claiming to have the files in December 2019.

Palesa briefly posted several of the stolen data on GitHub. However, they were deleted as of a consequence of the DMCA removal lawsuit submitted by AMD. Few screenshots of the stolen files are still accessible on GitHub, and the hacker vowed to give evidence to those interested in purchasing them.

“While we are aware the perpetrator has additional files that have not been made public, we believe the stolen graphics IP is not core to the competitiveness or security of our graphics products. We are not aware of the perpetrator possessing any other AMD IP,” AMD said.

“We are working closely with law enforcement officials and other experts as a part of an ongoing criminal investigation,” the company added.

 

Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.