Intel: Fortune not working well
Things for the past couple of weeks do not seem to be in fortune for Intel. Firstly losing $42 Billion in the stock market, causing a 16% fall. Though their new Tiger Lake CPU may seem a noteworthy achievement in books, but actual testing is still on desk work against AMD.
Source of Leak
Intel though is not in any mood to accept that it is hacked, responding to leak. More than a total of 20 GB worth of Intel internal documents has been uploaded on the cloud service, Mega. And now according to ZDNet, Intel is now trying to ascertain and trying to cover up the leaks that how were they leaked. The files were made online by Swiss software engineer Till Kottmann, most of these documents were marked “confidential”. He also stated that he has acquired these documents from a source who proclaims that he had acquired it from hacking the company near May. Till Kottmann has a history of publically publishing of data from major tech companies that was leaked online through various avenues, such as misconfigured Git repositories.
What is leaked?
After accessing those documents and files, it was found that it contains internal design information and source codes for various objects. It includes reference codes of BIOS and sample codes for Kaby Lake. It had Schematics, tools, and firmware for the company’s new release Tiger Lake processors. But relief talk about these files is that there is no leak sensitive information about Intel customers and employees.
What Intel Got to Say?
Although Kottmann stating that his source hacked into Intel’s server, hosted by Akami CDN wasn’t fully secured. But still, the company does not accept that it was hacked. The company somehow assumes that the files may have been leaked by someone who has the access to its Research and Design Center. It is a web portal it uses to give business partners access to non-public but technical documents about its various development projects of chipsets. Intel made clear that they are investigating the matter. They strongly believe that these documents are leaked by an individual having access to download.