• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
intel alder lake chips safe from novel exploits following source

Intel Alder Lake chips safe from novel exploits following source code leak, experts say

You are here: Home / General Cyber Security News / Intel Alder Lake chips safe from novel exploits following source code leak, experts say
October 10, 2022

Getty Illustrations or photos

Professionals have confident that the confirmed leak of Intel’s Alder Lake resource code will ‘most likely’ not guide to any meaningful adverse effect on the security of its items, regardless of others branding the leak as a “terrifying” prospect.

According to professionals who spoke to IT Pro, attackers would will need accessibility to other parts to have a sizeable chance of acquiring unsafe exploits and also be in a position to bypass the existing protections that Intel has in put.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“It is not likely that viewing computer software code alone will bring about a subsequent cyber security incident,” said John Goodacre, director at the UKRI’s Digital Security by Layout obstacle and professor of Laptop Architectures at Manchester College. “A great deal of the UEFI source code is currently open up supply and available for 3rd-party use and inspection.

“Proprietary initialisation and configuration code can make it less complicated to fully grasp likely attack vectors, but with proper components protection these as a root of rely on, dependable execution environments and other security by design features in the implementation would imply it is no much less secure except if creation keys are also exposed.”

Other people echoed Goodacre’s posture that the industry nor Intel shoppers should be alarmed. Martin Jartelius, chief security officer at Outpost24, stated the way in which the details had arrive to be leaked is considerably extra fascinating than the contents of the leak alone. 

“There is no require to be alarmed by this info leak in and of itself, if you are a person of this technology,” he explained. “There is, even so, a lot more worry that both someone working in relation to hardware both experienced their repository or technique breached, or are by themselves careless with the details they method on behalf of other people. The place this leak transpired and why, to me, is considerably much more of desire for us as a community than the code.”

At time of composing, no verifiable source for the data files has arrive ahead and for that reason couple conclusions on operational security can be drawn from the leak but it truly is selected that Intel will be investigating the incident closely.

The information sparked an first scare that the leak could direct to the discovery of novel exploits impacting Intel’s processors crafted working with its Alder Lake architecture, introduced in November 2021.

In principle, attackers with access to a firm’s source code are able to extra quickly come across novel vulnerabilities in the impacted products by reverse engineering the way in which the code functions.

Sam Linford, VP EMEA channels at Deep Intuition, agreed and included that “the theft of supply code is an incredibly terrifying prospect for organisations”. Other corporations such as Rockstar Game titles and LastPass have both been victims of source code theft this year. 

The Alder Lake leak

Rumours started circulating on Friday of a likely leak of Intel’s Alder Lake source code immediately after a sequence of links were being posted on Twitter via nameless messaging board 4Chan. The backlinks led to a down load of information totalling 5.86GB in sizing.

The Twitter url led to GitHub a repository titled ‘ICE_TEA_BIOS’ and was past edited on 30 September. This contained a compressed version of the data files, but has now been taken down.

“Our proprietary UEFI code seems to have been leaked by a third party,” mentioned an Intel spokesperson to IT Pro, confirming the leak to be real. 

“We do not believe that this exposes any new security vulnerabilities as we do not depend on obfuscation of information and facts as a security evaluate. This code is included beneath our bug bounty programme within the Challenge Circuit Breaker marketing campaign, and we really encourage any researchers who may perhaps detect possible vulnerabilities to carry them our notice by this programme.

“We are reaching out to the two consumers and the security analysis community to keep them educated of this predicament.”

Owing to the sizing of the file repository, security scientists are getting time to establish what critical info may have been uncovered by the leak. 

Issues have been right away raised over the extent to which hackers may be able to utilise Intel’s Alder Lake BIOS source code and it is nonetheless unclear whether the data files were being the subject of a information breach, or no matter if an insider leak from in Intel or a connected agency was the supply.


Some pieces of this post are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News German Cybersecurity Chief Faces Sacking Over Possible Russia Ties
Next Post: Intel Alder Lake chips safe from novel exploits following source code leak, experts say Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.