7 August 2020

20 GB of confidential Intel documents and specifications leaked online


20 GB of confidential Intel documents and specifications leaked online

Switzerland-based IT consultant Tillie Kottmann has released 20 GB of Intel confidential technical materials, source code, and documents regarding related to a various processors and chipsets.

“They were given to me by an anonymous source who breached them earlier this year, more details about this will be published soon", — Kottmann said on Twitter.

The information most likely came from the Resource and Design Center, a private data library for computer manufacturers, a spokesperson for Intel said. Access to the center is closed to the public, as confidential content is intended for creating firmware and designing motherboards compatible with Chipzilla's microprocessors.

The leaked database contains approximately 20 GB of confidential Intel files that are subject to a non-disclosure agreement, including:

  • Intel ME Bringup guides, tooling and samples for various platforms;

  • Kaby Lake (Purley Platform) BIOS Reference Code and Sample Code and Initialization code;

  • Intel CEFDK (Consumer Electronics Firmware Development Kit);

  • Silicon/FSP source code packages for various platforms;

  • Various Intel Development and Debugging Tools;

  • Simics Simulation for Rocket Lake S and potentially other platforms;

  • Various roadmaps;

  • Binaries for Camera drivers Intel made for SpaceX;

  • Schematics, Docs, Tools, and Firmware for the unreleased Tiger Lake platform;

  • Kaby Lake FDK training videos;

  • Intel Trace Hub and decoder files for various Intel ME versions;

  • Elkhart Lake Silicon Reference and Platform Sample Code;

  • Some Verilog stuff for various Xeon Platforms;

  • Debug BIOS/TXE builds for various Platforms;

  • Boot Guard SDK (encrypted zip);

  • Intel Snow Ridge/Snowfish Process Simulator ADK;

  • Intel Marketing Material Templates (InDesign).

Back to the list

Latest Posts

Threat actors increasingly abusing Microsoft Graph

Threat actors increasingly abusing Microsoft Graph

Graph API is often used for discreet communications to cloud-based C&C servers.
6 May 2024
Marriott admits its systems were not encrypted before 2018 data breach

Marriott admits its systems were not encrypted before 2018 data breach

Marriott has acknowledged that it used SHA-1 algorithm, which does not qualify as encryption.
6 May 2024
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

The attacks targeted entities "related to Russia's war of aggression against Ukraine."
6 May 2024