Get the latest tech news

Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty


Eaton Z made sure Intel had closed up all the unearthed security gaps before divulging this research.

It was possible to download sensitive information about 270,000 Intel employees until the end of February, according to Eaton Z, a security researcher, reverse engineer, and application developer. From the introduction to his lengthy blog post, it is hinted that Eaton thought testing the locks on Intel websites would be worth a shot, given the firm’s history of processor hardware vulnerabilities. Removing the URL filter from the API being probed eventually yielded “a nearly 1GB JSON file.” Inside this download, Eaton noted that there were details of every Intel employee (there are fewer now).

Get the Android app

Or read this on r/technology

Read more on:

Photo of Intel

Intel

Photo of data

data

Photo of researcher

researcher

Related news:

News photo

AWS still cares enough about Intel to order up a fresh batch of custom Xeons

News photo

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers

News photo

US in talks over 10% Intel stake, White House confirms