Article Details
Scrape Timestamp (UTC): 2024-08-26 16:50:30.689
Source: https://www.theregister.com/2024/08/26/amd_internal_data_intelbroker/
Original Article Text
Click to Toggle View
AMD internal data reportedly offered for sale. Second sensitive info theft claimed by the same crims since June. Digital data thieves have reportedly breached AMD's internal communications and are offering the allegedly stolen goods for sale. In an August 25 listing on the dark web marketplace BreachForums, criminal groups IntelBroker and EnergyWeaponUser took credit for the break-in, which they claimed took place the same day — and also swore is separate from IntelBroker's earlier theft and sale of AMD source code and other internal data from June. The BreachForums post promises buyers compromised comms from "a mix of sources," including "idmprod.xilinx.com" and "amdsso.okta.com," and reportedly contains user credentials, case numbers and descriptions, and internal resolutions. The attackers also provided a sample of the stolen data, which purports to be sensitive information including user names and assignment groups. AMD did not immediately respond to The Register's inquiries about the alleged intrusion. We will update this story when we receive a response from the chip designer. If this turns out to be true, and we strongly caution against taking criminals at their word, it will be the second breach of AMD's sensitive internal documents in three months. IntelBroker is reportedly behind both, with an apparent assist this time around by a newbie. Back in June, the American semiconductor manufacturer copped to a compromise, telling The Register: "We are aware of a cybercriminal organization claiming to be in possession of stolen AMD data. We are working closely with law enforcement officials and a third-party hosting partner to investigate the claim and the significance of the data." At the time, IntelBroker claimed to possess AMD's customer databases, upcoming product specifications and plans, internal financial figures and source code, firmware and ROMs, staff information, and other sensitive info. IntelBroker is also a site admin for the resurrected BreachForums. Over the past months, the group has claimed several high-profile intrusions and data sales, including Europol, the Pentagon, Korea's Ministry Of Defense, the US Army, and Home Depot, all of which have put a very large target on the cybercriminals' backs with international cops all gunning for the gang.
Daily Brief Summary
Criminal groups IntelBroker and EnergyWeaponUser claimed responsibility for the latest breach of AMD's security, reportedly occurring on the same day they announced it.
The breached data was listed for sale on the dark web site BreachForums and includes a variety of internal communications reportedly from sources such as idmprod.xilinx.com and amdsso.okta.com.
The stolen data includes user credentials, case descriptions, resolutions, and assignment groups, posing significant privacy and security risks.
IntelBroker had previously breached AMD in June, selling source codes and sensitive internal data, indicating a pattern of targeted attacks against the company.
AMD has been made aware of the breach and is currently investigating with the help of law enforcement and a third-party hosting service.
IntelBroker not only targets AMD but has claimed responsibility for several other high-profile breaches, including those involving Europol, the Pentagon, and other major institutions.
The cybercriminal group's repeated successes underline the challenges businesses face in protecting sensitive information against determined and skilled adversaries.