Reaction score
20 GB of Intel source code leaked online by anonymous hacker

Intel is investigating the global leak of more than 20 gigabytes of its proprietary data and source code

The data was released by Till Kottmann, a Swiss software engineer who said he received the files from an anonymous hacker who claimed to have hacked Intel earlier this year.

At the time of publication of this post, the data is available:
(not available)

torrent: magnet:?xt=urn:btih:38f947ceadf06e6d3ffc2b37b807d7ef80b57f21&dn=Intel%20exconfidential%20Lake%20drop%201

Many files are marked as “confidential” or “secret with restricted access.” source code and presentations from Q4 2018 to just a few months ago.

Another funny thing is that in the zip files you can find password protected ones. Most of them use the password Intel123

There is also a folder dedicated to the Intel Management Engine, but its contents are also not something Intel integrators don't already know. This is test code and guidance on when and how often to run automated tests when designing Intel ME systems.

Many observers have expressed concern that the source code contains comments containing the word "backdoor," a word that appears twice in source code associated with Intel's Purely Refresh chipset for Xeon processors.

How was Intel hacked?
The anonymous hacker who posted the documents said they were posted on an unsecured server hosted on the Akamai content delivery network. He also claimed that he identified the server using the nmap port scanning tool and from there used a Python script to guess the default passwords.

Although Intel said it does not believe the documents were obtained as a result of a network hack.