Intel Reports Hacker Has Leaked 20GB of Data From the Chip Giant

Intel

Intel is investigating claims that a suspected hacker has leaked 20 GB of chip giant data that appears to be linked to source code and documents and software from developers.

“The information appears to come from the Intel Resource and Design Center which houses information to be used by our customers , partners and other external parties who have registered for access,” an Intel spokesperson told. “We assume the data was downloaded and shared by an person with access.”

According to an individual behind the leak, the files “were given to me by an Anonymous Source that broke them earlier this year, more details will soon be published about this.”

“Most of the items here were NOT released ANYWHERE before and are classified as confidential under NDA or Intel Limited Secret.”

Data content confirmed to be in the leak includes:

• Intel ME Bring-up guides + (flash) tools + samples for different platforms

• Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization Code (some of which are exported as full history git repos)

• Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES

• Packages of silicon / FSP source code for different platforms

• Different Intel Development and Debugging Tools

• Simulation for Rocket Lake S, and probably other platforms

• Diverse road maps and other documents

• Camera driver binaries Intel made for SpaceX

• Schematics, Docs, Software + Firmware for Tiger Lake Platform Unreleased

• Training videos on Kabylake FDK

• Intel Trace Center + decoder files for different versions of Intel ME

• Sample Code of Elkhart Lake Silicone Reference and Platform

• BIOS / TXE debug builds for different platforms;

• SDK (encrypted zip) bootguard;

• Intel Snowridge / Snowfish Simulator phase ADK

• Complex schematics

• Examples of Intel marketing materials (InDesign)

Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.