Chipmaker Intel has confirmed that proprietary resource code linked to its Alder Lake CPUs has been leaked, subsequent its release by an unknown 3rd-party on 4chan and GitHub past week.
The printed material contains Unified Extensible Firmware Interface (UEFI) code for Alder Lake, the company’s 12th technology processors that was originally introduced in November 2021.
In a statement shared with Tom’s Hardware, Intel explained the leak does not expose “any new security vulnerabilities as we do not rely on obfuscation of information as a security measure.”
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
It is also encouraging the broader security exploration neighborhood to report any prospective issues by way of its bug bounty method, adding it truly is achieving out to clients to notify them of the matter.
Apart from the UEFI code, the leaked info dump features a plethora of data files and equipment, some of which surface to arrive from firmware vendor Insyde Software package.
Exact information surrounding the mother nature of the hack, together with its provenance, are unclear. The GitHub repository has given that been taken down, although it remains accessible by using other replicated variations.
That stated, indications are that the repository had been created by an staff of LC Long run Heart, a Chinese manufacturer of pcs and laptops.
Before this February, the LAPSUS$ extortionist team breached NVIDIA, siphoning 1TB of sensitive facts. The menace actor later claimed that the enterprise had launched a retaliatory ransomware strike to reduce the release of the stolen data.
Located this report attention-grabbing? Follow THN on Fb, Twitter and LinkedIn to read far more exceptional written content we submit.
Some components of this short article are sourced from:
thehackernews.com