Security

Cyber-crime

AMD internal data reportedly offered for sale

Second sensitive info theft claimed by the same crims since June


Digital data thieves have reportedly breached AMD's internal communications and are offering the allegedly stolen goods for sale. 

In an August 25 listing on the dark web marketplace BreachForums, criminal groups IntelBroker and EnergyWeaponUser took credit for the break-in, which they claimed took place the same day — and also swore is separate from IntelBroker's earlier theft and sale of AMD source code and other internal data from June.

The BreachForums post promises buyers compromised comms from "a mix of sources," including "idmprod.xilinx.com" and "amdsso.okta.com," and reportedly contains user credentials, case numbers and descriptions, and internal resolutions. 

The attackers also provided a sample of the stolen data, which purports to be sensitive information including user names and assignment groups.

AMD did not immediately respond to The Register's inquiries about the alleged intrusion. We will update this story when we receive a response from the chip designer.

If this turns out to be true, and we strongly caution against taking criminals at their word, it will be the second breach of AMD's sensitive internal documents in three months. IntelBroker is reportedly behind both, with an apparent assist this time around by a newbie.

Back in June, the American semiconductor manufacturer copped to a compromise, telling The Register: "We are aware of a cybercriminal organization claiming to be in possession of stolen AMD data. We are working closely with law enforcement officials and a third-party hosting partner to investigate the claim and the significance of the data."

At the time, IntelBroker claimed to possess AMD's customer databases, upcoming product specifications and plans, internal financial figures and source code, firmware and ROMs, staff information, and other sensitive info.

IntelBroker is also a site admin for the resurrected BreachForums. Over the past months, the group has claimed several high-profile intrusions and data sales, including Europol, the Pentagon, Korea's Ministry Of Defense, the US Army, and Home Depot, all of which have put a very large target on the cybercriminals' backs with international cops all gunning for the gang. ®

Send us news
1 Comment

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame