• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

New Evidence of Hacked Supermicro Hardware

Joined
Jan 17, 2010
Messages
12,280 (2.36/day)
Location
Oregon
System Name Juliette // HTPC
Processor Intel i7 9700K // AMD Ryzen 5 5600G
Motherboard ASUS Prime Z390X-A // ASRock B550 ITX-AC
Cooling Noctua NH-U12 Black // Stock
Memory Corsair DDR4 3600 32gb //G.SKILL Trident Z Royal Series 16GB (2 x 8GB) 3600
Video Card(s) ASUS RTX4070 OC// GTX 1650
Storage Samsung 970 EVO NVMe 1Tb, Intel 665p Series M.2 2280 1TB // Samsung 1Tb SSD
Display(s) ASUS VP348QGL 34" Quad HD 3440 x 1440 // 55" LG 4K SK8000 Series
Case Seasonic SYNCRO Q7// Silverstone Granada GD05
Audio Device(s) Focusrite Scarlett 4i4 // HDMI to Samsung HW-R650 sound bar
Power Supply Seasonic SYNCRO 750 W // CORSAIR Vengeance 650M
Mouse Cooler Master MM710 53G
Keyboard Logitech 920-009300 G512 SE
Software Windows 10 Pro // Windows 10 Pro
The more recent manipulation is different from the one described in the Bloomberg Businessweek report last week, but it shares key characteristics: They’re both designed to give attackers invisible access to data on a computer network in which the server is installed; and the alterations were found to have been made at the factory as the motherboard was being produced by a Supermicro subcontractor in China.

https://www.bloomberg.com/news/arti...ro-hardware-found-in-u-s-telecom?srnd=premium
 
Joined
Apr 8, 2010
Messages
992 (0.19/day)
Processor Intel Core i5 8400
Motherboard Gigabyte Z370N-Wifi
Cooling Silverstone AR05
Memory Micron Crucial 16GB DDR4-2400
Video Card(s) Gigabyte GTX1080 G1 Gaming 8G
Storage Micron Crucial MX300 275GB
Display(s) Dell U2415
Case Silverstone RVZ02B
Power Supply Silverstone SSR-SX550
Keyboard Ducky One Red Switch
Software Windows 10 Pro 1909
Interested to know which OEM manufactures their boards. The largest electronics OEM in China are not really Chinese companies
 
Joined
Oct 6, 2018
Messages
220 (0.11/day)
System Name SALTY
Processor A10-5800K
Motherboard A75
Cooling Air
Memory 10Gig DDR133
Video Card(s) HD 7660D
Storage HDD
Display(s) 4k HDR TV
Power Supply 320 Watt
The plot thickens …. wonder what will come of this?
 

FreedomEclipse

~Technological Technocrat~
Joined
Apr 20, 2007
Messages
23,358 (3.76/day)
Location
London,UK
System Name Codename: Icarus Mk.VI
Processor Intel 8600k@Stock -- pending tuning
Motherboard Asus ROG Strixx Z370-F
Cooling CPU: BeQuiet! Dark Rock Pro 4 {1xCorsair ML120 Pro|5xML140 Pro}
Memory 32GB XPG Gammix D10 {2x16GB}
Video Card(s) ASUS Dual Radeon™ RX 6700 XT OC Edition
Storage Samsung 970 Evo 512GB SSD (Boot)|WD SN770 (Gaming)|2x 3TB Toshiba DT01ACA300|2x 2TB Crucial BX500
Display(s) LG GP850-B
Case Corsair 760T (White)
Audio Device(s) Yamaha RX-V573|Speakers: JBL Control One|Auna 300-CN|Wharfedale Diamond SW150
Power Supply Corsair AX760
Mouse Logitech G900
Keyboard Duckyshine Dead LED(s) III
Software Windows 10 Pro
Benchmark Scores (ノಠ益ಠ)ノ彡┻━┻
Interested to know which OEM manufactures their boards. The largest electronics OEM in China are not really Chinese companies

Foxconn possibly. But at the same time i dont think it would be them because they are a huge company and they have many many big million dorrah contracts from Apple, Samsung, Sony, Dell... the list goes on.
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,862 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard EVGA z690 Dark KINGPIN (modded BIOS)
Cooling EK-AIO Elite 360 D-RGB
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Odyssey OLED G9 G95SC
Case Lian Li o11 Evo Dynamic White
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply Bequiet! Power Pro 12 1500w
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
This doesn't make alot of sense. Still 0 proof. No white papers or disassembly.

And most of all. You cant NOT see the network traffic.

You are telling me these companies went 3 years with super micro devices connected to business critical infra and did not see a peep in wireshark, monitoring software, edge firewalls, transport logs?

please.

meanwhile all of my supermicro servers are quite as ghosts when put on private lans and analyzed.
 
Joined
Apr 30, 2012
Messages
3,881 (0.89/day)
This doesn't make alot of sense. Still 0 proof. No white papers or disassembly.

And most of all. You cant NOT see the network traffic.

You are telling me these companies went 3 years with super micro devices connected to business critical infra and did not see a peep in wireshark, monitoring software, edge firewalls, transport logs?

please.

meanwhile all of my supermicro servers are quite as ghosts when put on private lans and analyzed.

Doubt Sepio Systems would be so public about it if it wasnt the case.

Three security experts who have analyzed foreign hardware implants for the U.S. Department of Defense confirmed that the way Sepio's software detected the implant is sound. One of the few ways to identify suspicious hardware is by looking at the lowest levels of network traffic. Those include not only normal network transmissions, but also analog signals -- such as power consumption -- that can indicate the presence of a covert piece of hardware.
 

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
18,924 (2.86/day)
Location
Piteå
System Name Black MC in Tokyo
Processor Ryzen 5 5600
Motherboard Asrock B450M-HDV
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Kingston Fury 3400mhz
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston A400 240GB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Line6 UX1 + some headphones, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Cherry MX Board 1.0 TKL Brown
VR HMD Acer Mixed Reality Headset
Software Windows 10 Pro
Benchmark Scores Rimworld 4K ready!
Foxconn possibly. But at the same time i dont think it would be them because they are a huge company and they have many many big million dorrah contracts from Apple, Samsung, Sony, Dell... the list goes on.

I read (can't remember if it was in the original piece or someones opinion about it) that they subcontract to smaller players when they have increased demands and not enough capacity to go around. So not Foxconn.

This doesn't make alot of sense. Still 0 proof. No white papers or disassembly.

And most of all. You cant NOT see the network traffic.

You are telling me these companies went 3 years with super micro devices connected to business critical infra and did not see a peep in wireshark, monitoring software, edge firewalls, transport logs?

please.

meanwhile all of my supermicro servers are quite as ghosts when put on private lans and analyzed.

Honest question: how would they be able to tell? I don't know how enterprise network security works, but given that a lot of them are hacked to begin with, or host stuff, how wold they know? I assume they have automatic systems in place; how do they tell nefarious connections from normal activity?
 
Joined
Apr 30, 2012
Messages
3,881 (0.89/day)
Honest question: how would they be able to tell? I don't know how enterprise network security works, but given that a lot of them are hacked to begin with, or host stuff, how wold they know? I assume they have automatic systems in place; how do they tell nefarious connections from normal activity?

From the article

In the case of the telecommunications company, Sepio's technology detected that the tampered Supermicro server actually appeared on the network as two devices in one. The legitimate server was communicating one way, and the implant another, but all the traffic appeared to be coming from the same trusted server, which allowed it to pass through security filters.
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,862 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard EVGA z690 Dark KINGPIN (modded BIOS)
Cooling EK-AIO Elite 360 D-RGB
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Odyssey OLED G9 G95SC
Case Lian Li o11 Evo Dynamic White
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply Bequiet! Power Pro 12 1500w
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
I read (can't remember if it was in the original piece or someones opinion about it) that they subcontract to smaller players when they have increased demands and not enough capacity to go around. So not Foxconn.



Honest question: how would they be able to tell? I don't know how enterprise network security works, but given that a lot of them are hacked to begin with, or host stuff, how wold they know? I assume they have automatic systems in place; how do they tell nefarious connections from normal activity?

It really depends. and for that I will water it down not because I dont think anyone will get it but because its easier for me to do with all the thoughts swimming in my head.

The traffic is probably encrypted.

This is fair and means that your right they wouldnt be able to "see" that it went to www.china.com

However.

Its the practice that makes me so sceptical and there are many sides and moving parts to that.

1: These are high profile companies (makes sense for a supply chain attack right?) like google alot of carrier grade companies customize the BIOS of these servers.

2: These companies arent just "ISPs" they are TRANSPORT providers they peer (move) traffic between sub sea cables and route between carrier (ISP) networks.

3: Systems that get dropped into this type of environment are stringently tested they do not just buy servers and switches and throw up a new data center equipment buildouts just to handle a small area in say your city cost millions in planning and architecting.

4: Suppose even if it were true and even if the data were encrypted, the server itself does not do routing. supermicro does not make Cisco 9508 core network racks. These servers probably cover a multitude of pourposes and might even be just a small server part of a much larger node or cluster that actually holds data. This is important because security is on everyones mind in the network/admin field right now. These servers are behind managmeent VLANs and are only permitted access to specific things.

With that said. The job of any carrier is to transport packets. It is a common misconception that a "good ISP" will protect me from bad guys are bad things. (maybe not at TPU but you would be surprised) that is not the case. A carrier network moves traffic lots of it. Whats important about this though is that rightly so, they would not "block" this traffic from going to any country its that if it originates on the "servers" it probably wont get to see the light of day.

Like I said while carriers do not generally employ any kind of blocking on the carrier level these servers are protected assets. They are only allowed to communicate with this or that network, they are also only accessible via specified VLANs and OOB (out of band) management systems.

The calls home would never connect. They wouldnt be allowed to get a public route.

This is where it starts to tie together. You see wireshark network monitoring edge firewalls and controlled routes deal with too much traffic to see this kind of thing. The operators are human. Thats exactly why I dont trust it though. Because its the SERVERs that are "compromised" and its the SERVERs that WOULD get caught. The internal core servers will trigger alerts and logs before any core router tells the night, switch operator that you are going to a porn site.


I am not saying I am smarter then these people. I am just saying the way this story sounds does not add up to best practice. My concentration is in security and thats not how this works. The amended article mentions people that worked for the CIA checked it and stated the way they discovered the bug is sound.

Ok but who was it?

Why isn't Sepio releasing the documents?

Why was supermicro only given 24 hours to respond when the industry (security and bug) generally mandated 90 days before public release?

How come the most guarded global network carriers did not see illegitimate traffic trying to transverse there network?

In situations like this you have to be on guard. There is no story to be had in the security industry, only facts. Without a picture and documentation it is NOT real.

From the article

That still makes no sense. That data has to want to GO somewhere. even encrypted it is attempting to transport to some IP address or polling DNS for a domain that isnt supermicro. There is an infinitesimally small chance this wouldnt be seen. Show me the logs.

Anyway thanks for asking. It's always good to want to know a bit more. Would love to see how it pans out. If true the tech behind it is amazing, or gross negligence of some of the biggest tech companies on the planet. Should be a hell of a ride or lastly its all BS. Should be a fun ride.
 
Joined
Mar 18, 2008
Messages
5,717 (0.97/day)
System Name Virtual Reality / Bioinformatics
Processor Undead CPU
Motherboard Undead TUF X99
Cooling Noctua NH-D15
Memory GSkill 128GB DDR4-3000
Video Card(s) EVGA RTX 3090 FTW3 Ultra
Storage Samsung 960 Pro 1TB + 860 EVO 2TB + WD Black 5TB
Display(s) 32'' 4K Dell
Case Fractal Design R5
Audio Device(s) BOSE 2.0
Power Supply Seasonic 850watt
Mouse Logitech Master MX
Keyboard Corsair K70 Cherry MX Blue
VR HMD HTC Vive + Oculus Quest 2
Software Windows 10 P
I will just quote from HardOCP comments:

I have a theory -



National security experts say a key problem is that, in a cybersecurity industry approaching $100 billion in revenue annually, very little of that has been spent on inspecting hardware for tampering. That's allowed intelligence agencies around the world to work relatively unimpeded, with China holding a key advantage.​

And the guy 'blowing the whistle' is the Co-CEO of a firm that does security analysis on hardware.........and had no evidence to back up his claim that he found stuff.....

And now -



In the wake of Bloomberg's reporting on the attack against Supermicro products, security experts say that teams around the world, from large banks and cloud computing providers to small research labs and startups, are analyzing their servers and other hardware for modifications, a stark change from normal practices. Their findings won't necessarily be made public, since hardware manipulation is typically designed to access government and corporate secrets, rather than consumer data.​

I wonder if his business has increased 100 fold in the last week?


Discovered by another Israeli security company... Just like CTS Labs and the AMD CPU "vulnerability"... Strikes me as just a little bit odd.

Something about this whole thing stinks.



Not the first time someone behind is trying to stir the water a bit. I am not buying this shit.
 

hat

Enthusiast
Joined
Nov 20, 2006
Messages
21,731 (3.42/day)
Location
Ohio
System Name Starlifter :: Dragonfly
Processor i7 2600k 4.4GHz :: i5 10400
Motherboard ASUS P8P67 Pro :: ASUS Prime H570-Plus
Cooling Cryorig M9 :: Stock
Memory 4x4GB DDR3 2133 :: 2x8GB DDR4 2400
Video Card(s) PNY GTX1070 :: Integrated UHD 630
Storage Crucial MX500 1TB, 2x1TB Seagate RAID 0 :: Mushkin Enhanced 60GB SSD, 3x4TB Seagate HDD RAID5
Display(s) Onn 165hz 1080p :: Acer 1080p
Case Antec SOHO 1030B :: Old White Full Tower
Audio Device(s) Creative X-Fi Titanium Fatal1ty Pro - Bose Companion 2 Series III :: None
Power Supply FSP Hydro GE 550w :: EVGA Supernova 550
Software Windows 10 Pro - Plex Server on Dragonfly
Benchmark Scores >9000
We could be reading this story for a lot of reasons. Maybe it's true, or maybe it's a smear campaign targeted at Supermicro, or maybe China. Who knows?
 
Joined
Apr 8, 2010
Messages
992 (0.19/day)
Processor Intel Core i5 8400
Motherboard Gigabyte Z370N-Wifi
Cooling Silverstone AR05
Memory Micron Crucial 16GB DDR4-2400
Video Card(s) Gigabyte GTX1080 G1 Gaming 8G
Storage Micron Crucial MX300 275GB
Display(s) Dell U2415
Case Silverstone RVZ02B
Power Supply Silverstone SSR-SX550
Keyboard Ducky One Red Switch
Software Windows 10 Pro 1909
Foxconn possibly. But at the same time i dont think it would be them because they are a huge company and they have many many big million dorrah contracts from Apple, Samsung, Sony, Dell... the list goes on.
I guessed foxconn as well, but like you said, it has way too many ties with US businesses. It would also make people think twice about using Taiwanese OEM's.
 
Joined
Sep 7, 2017
Messages
3,244 (1.34/day)
System Name Grunt
Processor Ryzen 5800x
Motherboard Gigabyte x570 Gaming X
Cooling Noctua NH-U12A
Memory Corsair LPX 3600 4x8GB
Video Card(s) Gigabyte 6800 XT (reference)
Storage Samsung 980 Pro 2TB
Display(s) Samsung CFG70, Samsung NU8000 TV
Case Corsair C70
Power Supply Corsair HX750
Software Win 10 Pro
We could be reading this story for a lot of reasons. Maybe it's true, or maybe it's a smear campaign targeted at Supermicro, or maybe China. Who knows?

I'm almost inclined to believe it. I don't want to however.. since I'm a fan of SM.

edit: I should point out that California has too many ties to China in general. So it wouldn't surprise me. Google and Apple are already kowtowing to them as it is (newly leaked Google docs show just how much - link). Even a Senator - Dianne Feinstein - had a chauffer for 20 years who turned out to be a spy for China. And somehow she didn't know. Nor is our government investigating it, as of yet. And somehow even our media doesn't want to talk about it enough (.. although there's the occassional editorial - link). I find this is even more bizarre than the Super Micro business. And it's much bigger than Super Micro too.
 
Last edited:

dorsetknob

"YOUR RMA REQUEST IS CON-REFUSED"
Joined
Mar 17, 2005
Messages
9,105 (1.31/day)
Location
Dorset where else eh? >>> Thats ENGLAND<<<
SuperMicro Should Reverse engineer several of their own boards ( random sampling) after all they own the blueprints/specs and know exactly what Semiconductor components should be installed.
They can then confirm that the Boards are made as they Designed and spec'ed them with the Correct components as per those original Blueprints.
 
Joined
Jul 16, 2014
Messages
8,116 (2.28/day)
Location
SE Michigan
System Name Dumbass
Processor AMD Ryzen 7800X3D
Motherboard ASUS TUF gaming B650
Cooling Artic Liquid Freezer 2 - 420mm
Memory G.Skill Sniper 32gb DDR5 6000
Video Card(s) GreenTeam 4070 ti super 16gb
Storage Samsung EVO 500gb & 1Tb, 2tb HDD, 500gb WD Black
Display(s) 1x Nixeus NX_EDG27, 2x Dell S2440L (16:9)
Case Phanteks Enthoo Primo w/8 140mm SP Fans
Audio Device(s) onboard (realtek?) - SPKRS:Logitech Z623 200w 2.1
Power Supply Corsair HX1000i
Mouse Steeseries Esports Wireless
Keyboard Corsair K100
Software windows 10 H
Benchmark Scores https://i.imgur.com/aoz3vWY.jpg?2
I would assume that large orders of products would be negotiated to follow certain specifications and price. So it wouldnt surprise me that custom orders deem it necessary to make new motherboards from scratch, at which time they can be modified without customer knowledge.

tinhat wearers agree. :kookoo:
 
Joined
Sep 7, 2017
Messages
3,244 (1.34/day)
System Name Grunt
Processor Ryzen 5800x
Motherboard Gigabyte x570 Gaming X
Cooling Noctua NH-U12A
Memory Corsair LPX 3600 4x8GB
Video Card(s) Gigabyte 6800 XT (reference)
Storage Samsung 980 Pro 2TB
Display(s) Samsung CFG70, Samsung NU8000 TV
Case Corsair C70
Power Supply Corsair HX750
Software Win 10 Pro
I would assume that large orders of products would be negotiated to follow certain specifications and price. So it wouldnt surprise me that custom orders deem it necessary to make new motherboards from scratch, at which time they can be modified without customer knowledge.

tinhat wearers agree. :kookoo:

It's tinfoil hats. I don't think regular tin hats have the correct magical calibration. :p

I imagine the custom orders follow a standard template.. but yeah, it's more open to abuse.
 
Joined
Mar 2, 2011
Messages
1,226 (0.26/day)
Location
Omaha, NE
System Name Graphics Card Free...
Processor Ryzen 5 5600G
Motherboard MSI B450 Gaming Plus MAX Wifi
Cooling Cryorig M9a w/ BeQuiet! PureWings 2 ~ 92mm
Memory Corsair Dominator Platinum DDR4 3200 ~ 16GB(2x8GB)
Storage Samsung EVO 870 SSD - 1TB
Display(s) AOC 24G2
Case Cardboard...
Power Supply eVGA SuperNova 550w G3
Mouse Logitech t400 Zone Touch Mouse
Keyboard IBM Model "M" Keyboard
Software Manjaro ~ KDE Plasma
Benchmark Scores She's a Runner!
I buy my straw hats in January. So, please shoot me a message if the price of SM motherboards crash. I had one a few years ago and I'd like another.

It was an extremely solid board once I got past my own ignorance....:).

Best,

Liquid Cool
 
Joined
Oct 6, 2018
Messages
220 (0.11/day)
System Name SALTY
Processor A10-5800K
Motherboard A75
Cooling Air
Memory 10Gig DDR133
Video Card(s) HD 7660D
Storage HDD
Display(s) 4k HDR TV
Power Supply 320 Watt
It was a few years back now so I can't remember if it was on the news or I read it or both, but anyway it was about those credit card reader they have in petrol stations, they found out that they where stealing credit card info and sending info to some server (something along those lines) then they found that these where being installed at the factory where they where made, it turned out someone or group had infiltrated the work force and where installing these devices at the factory, the company was not aware this was going on until it was reported.

so I guess its always poss that rouge people/organisation could of infiltrated the factory and the owners probs would never know, not saying that's what happened but that stuff can and does happen.
 

silentbogo

Moderator
Staff member
Joined
Nov 20, 2013
Messages
5,473 (1.44/day)
Location
Kyiv, Ukraine
System Name WS#1337
Processor Ryzen 7 3800X
Motherboard ASUS X570-PLUS TUF Gaming
Cooling Xigmatek Scylla 240mm AIO
Memory 4x8GB Samsung DDR4 ECC UDIMM
Video Card(s) Inno3D RTX 3070 Ti iChill
Storage ADATA Legend 2TB + ADATA SX8200 Pro 1TB
Display(s) Samsung U24E590D (4K/UHD)
Case ghetto CM Cosmos RC-1000
Audio Device(s) ALC1220
Power Supply SeaSonic SSR-550FX (80+ GOLD)
Mouse Logitech G603
Keyboard Modecom Volcano Blade (Kailh choc LP)
VR HMD Google dreamview headset(aka fancy cardboard)
Software Windows 11, Ubuntu 20.04 LTS
The story is kind of shady at best.

First, it was a chip embedded into motherboard, then it was a software hack, then it was both of the above, only now embedded into Ethernet port...
In all instances it started w/ Bloomberg publishing this stuff on behalf of Sepio, and in all instances there is nothing to go by except "an anonymous source from a high-profile tech company" and "[insert your super-serious agency here] has confirmed". Even went as far as making these scary infographics with components being stripped away off the motherboard to reveal a tiny spec, or making photos of some random UDFN-6 component near the pencil tip to make it look even scarier...
 
Joined
Dec 10, 2017
Messages
266 (0.11/day)
Processor Intel core i5 4590s
Motherboard Asus Z97 Pro Gamer
Cooling Evercool EC115A 915SP Cpu cooler,Coolermaster [200mm (front and top)+140mm rear]
Memory Corsair 16GB(4x4) ddr3 CMZ16GX3M4X1600C9(Ver8.16)(XMP)
Video Card(s) MSI GTX 970 GAMING 4G
Storage Western Digital WDC WD2001FAS 2TB Black, Toshiba DT01ACA100 1TB
Display(s) LG Flatron L177WSB
Case Coolermaster CM Storm Enforcer
Audio Device(s) Creative A550 Speakers 5.1 channel
Power Supply SuperFlower Leadex 2 Gold 650W SF-650F14EG
Mouse PLNK M-740 Optical Mouse
Keyboard ibuypower GKB100 Gaming Keyboard
Software Windows 7 Sp1 64 bit
focus has shifted from methodology and implications of hack to verification of validity of claims...I have lost interest
 

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
18,924 (2.86/day)
Location
Piteå
System Name Black MC in Tokyo
Processor Ryzen 5 5600
Motherboard Asrock B450M-HDV
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Kingston Fury 3400mhz
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston A400 240GB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Line6 UX1 + some headphones, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Cherry MX Board 1.0 TKL Brown
VR HMD Acer Mixed Reality Headset
Software Windows 10 Pro
Benchmark Scores Rimworld 4K ready!
I will just quote from HardOCP comments:







Not the first time someone behind is trying to stir the water a bit. I am not buying this shit.

The story is kind of shady at best.

First, it was a chip embedded into motherboard, then it was a software hack, then it was both of the above, only now embedded into Ethernet port...
In all instances it started w/ Bloomberg publishing this stuff on behalf of Sepio, and in all instances there is nothing to go by except "an anonymous source from a high-profile tech company" and "[insert your super-serious agency here] has confirmed". Even went as far as making these scary infographics with components being stripped away off the motherboard to reveal a tiny spec, or making photos of some random UDFN-6 component near the pencil tip to make it look even scarier...

But Sepio wasn't involved in the first article afaik, the Ethernet thing was much later.

This is important because security is on everyones mind in the network/admin field right now.

Thanks for the answer! I highlighted this bit as the attacks were supposedly done some years ago, and I know (or at least assume, from randomly following Krebs and various tech sites articles :p) the security field evolves pretty fast... Is it possible it was easier to do this in 2014/15 than today?
 

newtekie1

Semi-Retired Folder
Joined
Nov 22, 2005
Messages
28,472 (4.24/day)
Location
Indiana, USA
Processor Intel Core i7 10850K@5.2GHz
Motherboard AsRock Z470 Taichi
Cooling Corsair H115i Pro w/ Noctua NF-A14 Fans
Memory 32GB DDR4-3600
Video Card(s) RTX 2070 Super
Storage 500GB SX8200 Pro + 8TB with 1TB SSD Cache
Display(s) Acer Nitro VG280K 4K 28"
Case Fractal Design Define S
Audio Device(s) Onboard is good enough for me
Power Supply eVGA SuperNOVA 1000w G3
Software Windows 10 Pro x64
https://www.servethehome.com/yossi-...-positioning-his-research-against-supermicro/

IMO, this is a better article on the issue. The security firm that allegedly found the issues didn't just find them in Supermicro products, and they can't be sure it was put there during manufacturing in China.

The thing that I find interesting is we have yet even see this supposed hardware that they found. It hasn't been analyzed by any other source to figure out exactly what it is and what it does.
 
Joined
Sep 15, 2011
Messages
6,466 (1.41/day)
Processor Intel® Core™ i7-13700K
Motherboard Gigabyte Z790 Aorus Elite AX
Cooling Noctua NH-D15
Memory 32GB(2x16) DDR5@6600MHz G-Skill Trident Z5
Video Card(s) ZOTAC GAMING GeForce RTX 3080 AMP Holo
Storage 2TB SK Platinum P41 SSD + 4TB SanDisk Ultra SSD + 500GB Samsung 840 EVO SSD
Display(s) Acer Predator X34 3440x1440@100Hz G-Sync
Case NZXT PHANTOM410-BK
Audio Device(s) Creative X-Fi Titanium PCIe
Power Supply Corsair 850W
Mouse Logitech Hero G502 SE
Software Windows 11 Pro - 64bit
Benchmark Scores 30FPS in NFS:Rivals
I think everybody should relax for a bit and chill the hypocrisy.
You are all acting like China spying on US it's the worst thing happened since the invention of Politics or Java. :laugh::laugh:
The US had and has the most advances spying System in the world with the tentacles spread all over the world. Heck, the Internet itself it's the biggest and most complex tool ever developed by Humanity, with all it's 7 Layers possible to hacking, spying, etc, etc.
This news it's just a grain in the sand, more bashing on China, just because...
 
Joined
Aug 20, 2007
Messages
20,759 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64
Doubt Sepio Systems would be so public about it if it wasnt the case.

So it either is a recent occurance, or this stinks to high heavens precisely because it's not real. I'm not sure which one is more plausible honestly... But there is no way this has been going on long term and no one noticed the net traffic.

Either way, I remain a skeptic without documentation (which if this is real, should benefit everyone). The fact that none has been provided stinks to high heavens and has me in @Solaris17's camp

The thing that I find interesting is we have yet even see this supposed hardware that they found. It hasn't been analyzed by any other source to figure out exactly what it is and what it does.

This. So much this.
 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,862 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard EVGA z690 Dark KINGPIN (modded BIOS)
Cooling EK-AIO Elite 360 D-RGB
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Odyssey OLED G9 G95SC
Case Lian Li o11 Evo Dynamic White
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply Bequiet! Power Pro 12 1500w
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
But Sepio wasn't involved in the first article afaik, the Ethernet thing was much later.



Thanks for the answer! I highlighted this bit as the attacks were supposedly done some years ago, and I know (or at least assume, from randomly following Krebs and various tech sites articles :p) the security field evolves pretty fast... Is it possible it was easier to do this in 2014/15 than today?

hm, I'm not sure, I cant imagine it would be though. remember these servers are only in production for 3-5 years before they are swapped out if the company makes enough (which these companies do) so that would only raise my doubt higher. As for actual detection, I dont think the capacity would have changed that much. The protocols monitored came out in the 80s. The evolution of the modern data center has certainly changed alot and the security of such is certainly more complex. At the end of the day though traffic cant go from X to X remains the same. We just have fancy graphs and more VMs now.
 
Top