{
	"id": "b00612e5-05bc-49d7-b162-d48a3e48f776",
	"created_at": "2026-04-06T00:16:31.159781Z",
	"updated_at": "2026-04-10T13:11:26.88537Z",
	"deleted_at": null,
	"sha1_hash": "570eecaa981c13f0cf44439b26af9bb15f9c3144",
	"title": "More than 20GB of Intel source code and proprietary data dumped online",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 203499,
	"plain_text": "More than 20GB of Intel source code and proprietary data\r\ndumped online\r\nBy Dan Goodin\r\nPublished: 2020-08-06 · Archived: 2026-04-05 21:05:04 UTC\r\nMost of these documents and source code packages apply to Intel CPU platforms, like Kaby Lake or the\r\nupcoming Tiger Lake, although there is a smattering of other documents relating to other products, such as a\r\nsensor package Intel developed for SpaceX.\r\nThere is also a folder dedicated to the Intel Management Engine, but its contents, too, aren’t anything Intel\r\nintegrators don’t already know. They’re test code and recommendations for when and how often to run those\r\nautomated tests while designing systems that include an Intel CPU with the Intel ME.\r\nOne of the dump’s newer bits included “Whitley/Cedar Island Platform Message of the Week,” dated May 5.\r\nCedar Island is the motherboard architecture that lies beneath both Cooper Lake and Ice Lake Xeon CPUs. Some\r\nof those chips were released earlier this year, while some have yet to become generally available. Whitley is the\r\ndual-socket architecture for both Cooper Lake (14nm) and Ice Lake (10nm) Xeons. Cedar Island is for Cooper\r\nLake only\r\nThe contents include plenty of diagrams and graphics like the one below:\r\nSome contents provide a cryptic reference to voltage failures in some Ice Lake samples. It’s not clear if the\r\nfailures apply to actual hardware delivered to customers or if they’re happening on reference boards Intel provided\r\nto OEMs for use in designing their own boards.\r\nhttps://arstechnica.com/information-technology/2020/08/intel-is-investigating-the-leak-of-20gb-of-its-source-code-and-private-data/\r\nPage 1 of 2\n\nHow done it?\r\nWhile Intel said it doesn’t believe the documents were obtained through a network breach, a screenshot of the\r\nconversation Kottmann had with the source provided an alternate explanation. The source said that the documents\r\nwere hosted on an unsecured server hosted on Akamai’s content delivery network. The source claimed to have\r\nidentified the server using the nmap port-scanning tool and from there, used a python script to guess default\r\npasswords.\r\nHere’s the conversation:\r\nsource: They have a server hosted online by Akami CDN that wasn’t properly secure. After an internet\r\nwide nmap scan I found my target port open and went through a list of 370 possible servers based on\r\ndetails that nmap provided with an NSE script.\r\nsource: I used a python script I made to probe different aspects of the server including username\r\ndefaults and unsecure file/folder access.\r\nsource: The folders were just lying open if you could guess the name of one. Then when you were in the\r\nfolder you could go back to root and just click into the other folders that you didn’t know the name of.\r\ndeletescape: holy shit that’s incredibly funny\r\nsource: Best of all, due to another misconfiguration, I could masqurade as any of their employees or\r\nmake my own user.\r\ndeletescape: LOL\r\nsource: Another funny thing is that on the zip files you may find password protected. Most of them use\r\nthe password Intel123 or a lowercase intel123\r\nsource: Security at it’s finest.\r\nKottmann said they didn’t know the source well, but, based on the apparent authenticity of the material, there’s no\r\nreason to doubt the source’s account of how it was obtained.\r\nSource: https://arstechnica.com/information-technology/2020/08/intel-is-investigating-the-leak-of-20gb-of-its-source-code-and-private-data/\r\nhttps://arstechnica.com/information-technology/2020/08/intel-is-investigating-the-leak-of-20gb-of-its-source-code-and-private-data/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://arstechnica.com/information-technology/2020/08/intel-is-investigating-the-leak-of-20gb-of-its-source-code-and-private-data/"
	],
	"report_names": [
		"intel-is-investigating-the-leak-of-20gb-of-its-source-code-and-private-data"
	],
	"threat_actors": [],
	"ts_created_at": 1775434591,
	"ts_updated_at": 1775826686,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/570eecaa981c13f0cf44439b26af9bb15f9c3144.pdf",
		"text": "https://archive.orkl.eu/570eecaa981c13f0cf44439b26af9bb15f9c3144.txt",
		"img": "https://archive.orkl.eu/570eecaa981c13f0cf44439b26af9bb15f9c3144.jpg"
	}
}