Security News > 2021 > February > Supermicro spy chips, the sequel: It really, really happened, and with bad BIOS and more, insists Bloomberg
Following up on a disputed 2018 claim in its BusinessWeek publication that tiny spy chips were found on Supermicro server motherboards in 2015, Bloomberg on Friday doubled down by asserting that Supermicro's products were targeted by Chinese operatives for over a decade, that US intelligence officials have been aware of this, and that authorities kept this information quiet while crafting defenses in order to study the attack.
The article - a follow-on to BusinessWeek's 2018 spy chip bombshell - cites three specific incidents: the 2010 discovery by the Defense Department that thousands of its computers were sending military network data to China due to code hidden in chips that handle the server startup process; Intel's discovery in 2014 that a Chinese hacking group penetrated its network via a server that fetched malware from an unidentified supplier's update site; and a 2015 warning issued by the FBI to multiple companies that Chinese agents had hidden an extra chip with backdoored code on one manufacturer's servers.
In other words, Bloomberg has expanded its claim that chips containing malicious spyware were added to Supermicro server motherboards, to also include claims of malicious alterations to BIOS-level software to load and run surveillance code hidden in firmware, and to include alleged attacks on other vendors.
The story further says that while it's unclear whether this investigation remains ongoing, the Feds began working with people in the private sector to analyze these purported spy chips that had been secreted onto circuit boards.
To date, no one has presented any public evidence these spy chips exist: no one's pointed at board and told the world, there, that's the spy chip.
The Bloomberg report today does provide a named source, Mukul Kumar, who as chief security officer for FPGA designer Altera claims to have learned of such a spy chip during an unclassified briefing.
News URL
https://go.theregister.com/feed/www.theregister.com/2021/02/12/supermicro_bloomberg_spying/