{"id":300,"date":"2020-08-17T12:49:25","date_gmt":"2020-08-17T12:49:25","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=300"},"modified":"2020-08-17T13:13:32","modified_gmt":"2020-08-17T13:13:32","slug":"did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/","title":{"rendered":"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak"},"content":{"rendered":"<p>Depending on whose version of the story is correct, a 20 GB data leak affecting Intel presents an important lesson on either the perils of default credentials and insecure server misconfigurations, or the risks of sharing proprietary secrets with third-party business partners and customers.<\/p>\n<p>Software engineer Tillie Kottmann, whose Twitter account looks to have been suspended, last week tweeted that an anonymous hacker shared with him a spate of internal Intel documents \u2013 the first of might be a series of leaks. Kottmann uploaded these confidential assets \u2013 including source code, product guides and manuals, technical specs, development and debugging tools and more \u2013 online via the file-sharing site MEGA and dubbed the leak \u201cexconfidential Lake.\u201d<\/p>\n<p>Several news outlets published an apparent conversation between Kottmann and the mysterious hacker persona, in which the perpetrator said that he (or she) had exfiltrated from an improperly secured internet server hosted via Akamai\u2019s content delivery network. The anonymous hacker said he found the breached server using a scanning tool and leveraged a Python script to uncover username defaults and unsecure instances of file or folder access. Once inside a folder, root access was then possible.<\/p>\n<p>However, Intel in a statement denied that there was a hack and instead suspects that a rogue third party individual with access to the company\u2019s Resource and Design Center web portal maliciously downloaded and leaked the information. The company also thinks the culprit could have amassed the information from multiple web sources.<\/p>\n<p>Source: SC Magazine<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/data-breach\/whatever-the-cause-intel-leak-still-stings\/\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depending on whose version of the story is correct, a 20 GB data leak affecting Intel presents an important lesson on either the perils of default credentials and insecure server misconfigurations, or the risks of sharing proprietary secrets with third-party business partners and customers. Software engineer Tillie Kottmann, whose Twitter account looks to have been [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community\" \/>\n<meta property=\"og:description\" content=\"Depending on whose version of the story is correct, a 20 GB data leak affecting Intel presents an important lesson on either the perils of default credentials and insecure server misconfigurations, or the risks of sharing proprietary secrets with third-party business partners and customers. Software engineer Tillie Kottmann, whose Twitter account looks to have been [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-17T12:49:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-17T13:13:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/\",\"name\":\"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg\",\"datePublished\":\"2020-08-17T12:49:25+00:00\",\"dateModified\":\"2020-08-17T13:13:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/","og_locale":"en_US","og_type":"article","og_title":"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community","og_description":"Depending on whose version of the story is correct, a 20 GB data leak affecting Intel presents an important lesson on either the perils of default credentials and insecure server misconfigurations, or the risks of sharing proprietary secrets with third-party business partners and customers. Software engineer Tillie Kottmann, whose Twitter account looks to have been [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-08-17T12:49:25+00:00","article_modified_time":"2020-08-17T13:13:32+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/","name":"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg","datePublished":"2020-08-17T12:49:25+00:00","dateModified":"2020-08-17T13:13:32+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/08\/pexels-pok-rie-1432673.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/did-intel-fail-to-protect-proprietary-secrets-or-misconfigure-servers-lessons-from-the-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Did Intel fail to protect proprietary secrets, or misconfigure servers? Lessons from the leak"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/300\/revisions\/302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}