Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security //

Data Center

10/10/2018
07:00 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Bloomberg: Major Telecom Also Found Hacked Supermicro Servers

As questions swirled around a Bloomberg story about hardware hacked by Chinese spies, a second story finds that a major telecom also discovered compromised Supermicro servers.

A major US telecom company discovered that servers that used its own data center had been hacked, and this manipulated hardware could be used for spying and industrial espionage within the business, according to another report from Bloomberg.

If true, this new report could bolster that argument that a specialized division within China's army has installed specialized chips and other gear within the motherboards of Supermicro servers, which were then shipped to companies around the world. (See China Hacks Hardware in Spying Attempt on Apple, Amazon & Others Report.)

Bloomberg published a second story about compromised servers on Tuesday, October 9. The report is based on details provided to reporters by Yossi Appleboum, a security expert. Appleboum's company had conducted a security survey of the telecom's data center and found that the server's Ethernet connector had been manipulated.

(Source: iStock)
(Source: iStock)

Those servers were later ripped out of the data center in August of this year.

The Bloomberg report did not name the telecom company.

Last week, Bloomberg reported that spies working for the government of China appeared to have installed highly specialized chips within the motherboards of Supermicro servers. Later, Apple and Amazon each independently discovered the microprocessors, and sent some information to the FBI and other government officials.

The blockbuster story has met a storm of controversy with Supermicro, Apple and Amazon all denying the account. The government of China also denied the report, and the US Department of Homeland Security agreed with the accounts of Apple and other companies. (See Bloomberg Hardware Hacking Story Faces Fierce Backlash From Apple & DHS.)

Tuesday's story is likely to raise more questions about China's role in manipulating the global technology supply chain. The Bloomberg story illustrated that since much of the world's hardware is manufactured in China, the government there is in a unique position to manipulate gear within the factories before it's shipped out to clients.

When contacted by Bloomberg, Supermicro issued a statement, noting that: "We take care to secure the integrity of our products throughout the manufacturing process, and supply chain security is an important topic of discussion for our industry."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34202
PUBLISHED: 2021-06-16
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remot...
CVE-2021-32659
PUBLISHED: 2021-06-16
Matrix-appservice-bridge is the bridging service for the Matrix communication program's application services. In versions 2.6.0 and earlier, if a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombs...
CVE-2020-25755
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.
CVE-2020-25754
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an una...
CVE-2020-25753
PUBLISHED: 2021-06-16
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.