• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel Hit by a Devastating Data Breach, Chip Designs, Code, Possible Backdoors Leaked

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,683 (7.42/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Intel on Thursday was hit by a massive data-breach, with someone on Twitter posting links to an archive that contains the dump of the breach - a 20-gigabyte treasure chest that includes - but not limited to - Intel Management Engine bringup guides, flashing tools, samples; source code of Consumer Electronics Firmware Development Kit (CEFDK); silicon and FSP source packages for various platforms; an assortment of development and debugging tools; Simics simulation for "Rocket Lake S" and other platforms; a wealth of roadmaps and other documents; shcematics, documents, tools, and firmware for "Tiger Lake," Intel Trace Hub + decoder files for various Intel ME versions; "Elkhart Lake" silicon reference and sample code; Bootguard SDK, "Snow Ridge" simulator; design schematics of various products; etc.

The most fascinating part of the leak is the person points to the possibility of Intel laying backdoors in its code and designs - a very tinfoil hat though likely possibility in the post-9/11 world. Intel in a comment to Tom's Hardware denied that its security apparatus had been compromised, and instead blamed someone with access to this information for downloading the data. "We are investigating this situation. The information appears to come from the Intel Resource and Design Center, which hosts information for use by our customers, partners and other external parties who have registered for access. We believe an individual with access downloaded and shared this data," a company spox said.



View at TechPowerUp Main Site
 
Well, I suppose sinking ships are known to spring leaks.
 
The tweeter also notes "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was acquired from Intel."

The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.


=========================

Are Intel engineers really that dump and marked "backdoors" in the actual code ?
 
Intel Management Engine bringup guides, flashing tools

I donno what you guys think, but for me, it is time to work towards complete removal and replacement of IntelME, security aside, this pesky thing stop our BCLK overclock when the chip is perfectly fine!
 
NSA backdoor password was also Intel123
 
This leak is likely going to give Intel more headaches with security going forward.
 
I love the picture of the Dam wall breaking before the flood hits everyone below, that is not a leak, someone blew it wide open.
 
Intel is the crazy hookup trying to get your attention no holds barred.
 
I like the fact that they didn't even bother to use codewords for backdoor. Just use backdoor like no one is ever gonna see our internal communications... lmao.
 
Are these just tools used by intel partners to develop products that work with intel cpus/chipsets, etc?
 
Couldn't happen to a nicer company at least. Somebody set us up the backdoor.
 
Low quality post by tfdsaf
All of Intel's "features" are essentially backdoors for governments and George Soros type billionaires who want to control you and your family!
 
Who could have possibly guessed that Intel has security vulnerabilities?
 
the possibility of Intel laying backdoors in its code and designs

I'd like to know more on that. I know it's been speculated but if it could be shown to be true, it'd reveal how little importance Intel places on your personal freedoms. And, if true, was it mandated to be put in place, or done so for it's own ends?
 
The tweeter also notes "If you find password protected zips in the release the password is probably either "Intel123" or "intel123". This was not set by me or my source, this is how it was acquired from Intel."

The poster encourages downloaders to look for mentions of 'backdoors' in some of the Intel source code, and even provides a sample clip of one such listing, but we aren't sure of the intentions behind the listings in the code.


=========================

Are Intel engineers really that dump and marked "backdoors" in the actual code ?

As I said elsewhere, I have my doubts. It's more likely the hacker is trying to make them look dumb to inflate his own ego.

I have been through parts of the leak. Nothing special, yet.

I'd like to know more on that. I know it's been speculated but if it could be shown to be true, it'd reveal how little importance Intel places on your personal freedoms. And, if true, was it mandated to be put in place, or done so for it's own ends?

FWIW, the evidence he's provided is a code snippet for a management engine remote access service, not a backdoor. There is a lot to comb through though. Pretty sure he just added some code comments. The hacker seems to do this in a few places, making the whole leak questionable.
 
Last edited:
This stuff proves there is something seriously wrong with Intel. Maybe after all of this some changes are in order? I surely hope so.
 
This stuff proves there is something seriously wrong with Intel. Maybe after all of this some changes are in order? I surely hope so.

The question is. Why a back door ? And why 9/11
 
Back
Top