Intel hacked, BIOS source code leaked

A Twitter user posted a repository link containing around 20 GB of Intel copyright (IP), including source code, processor production documentation, and more.

The violation was allegedly committed earlier this year by an anonymous person.Intel

The tweet states that the information is in his hands from the breach are highly confidential and subject to non-disclosure agreements (NDA). The post contains a list of the breached data, adding that "the good and most private" ones will be released in the future.

The contents of the list include the "Kaby Lake BIOS Reference Code, Intel Camera Drivers Binaries for SpaceX" and more.
There is also information about future generations of processors, which could be harmful if the code falls into the wrong hands.

Although the data and files mentioned above may not make sense to most users, they could be used by malicious users to detect potential vulnerabilities.
Having a chance to read the source code they could develop that exploits any potential security gaps.

https://twitter.com/deletescape/status/1291405688204402689

As for the company's security policies, read it below :

If you find password protected zips in the the password is probably either “Intel123” or “intel123”. This was not set by me or my source, this is how it was acquired from Intel.

We added the tweet that contains the links to the repository but you better not visit it.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).