Home Security Bloomberg says big US telco hit by hardware tampering
Bloomberg says big US telco hit by hardware tampering Pixabay Featured

Apparently undeterred by strong criticism of a supply chain attack story it published last week, Bloomberg has put out another yarn, dealing with a similar theme, this time about a "major US telecommunications company" that allegedly encountered doctored hardware made by the US company Supermicro Computer.

Tuesday's story, written by Jordan Robertson and Michael Riley — the same reporters who filed a yarn last week claiming that chips are being implanted by a Chinese contractor on server motherboards sold by Supermicro and being used to spy on some companies — alleges that a security expert working for the telco in question found evidence of tampering.

Last week's story has been met with strong denials from Apple and Amazon, two companies named as being affected. It has also been contradicted by the US Department of Homeland Security and the British National Cyber Security Centre.

Additionally, a senior Apple security official wrote to the US Congress directly saying there was no evidence to back Bloomberg's claims while a former general counsel of the company said he had asked the FBI about the charges and been told that the agency knew nothing about it.

In Tuesday's story, headlined "New evidence of hacked Supermicro hardware found in US telecom", Bloomberg cited Yossi Appleboum, whom it described as a security expert working for Sepio Systems and a former hacker with the Israeli Army Intelligence Corps, as saying "unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector, a component that's used to attach network cables to the computer".

The story did not name the US telco in question. The website Motherboard  said it had contacted 10 major American providers and the four biggest companies — AT&T, Verizon, Sprint and T-Mobile — had denied they had been attacked. CenturyLink also issued a denial.

Bloomberg included a statement from Supermicro in Tuesday's story, again denying that any of its hardware had been compromised. The company said: "We are dismayed that Bloomberg would give us only limited information, no documentation, and half a day to respond to these new allegations.” To that, Bloomberg said Supermicro had been given 24 hours to respond.

The story also mentioned that Supermicro shares had fallen 47% after the first story on Thursday last week. After the new story appeared, the company's stock fell by 27%.

As iTWire has reported, citing a Business Insider story from 2013, Bloomberg has a practice of paying higher annual bonuses to those who write stories that move markets. The first story resulted in Lenovo shares falling by as much as 23% across Asia on Friday, while the stocks of ZTE Corporation, China's biggest telecommunications equipment maker, fell by about 14% in Hong Kong trading. And both Apple and Amazon lost a little less than 2% of their value following the report.

According to Tuesday's story, the tampering was done on an Ethernet connector, which it said appeared to be similar to a method used by the NSA, the details of which were leaked in 2013.

Further, it said that this made the server that had tampered equipment appear as two devices on the network. "The legitimate server was communicating one way, and the implant another, but all the traffic appeared to be coming from the same trusted server, which allowed it to pass through security filters," is how it was described.

Meanwhile, in a development related to last Thursday's story, hardware security expert Joe Fitzpatrick, who was briefly quoted by Bloomberg in that story, gave an interview to the podcast Risky Business in which he said he was not comfortable with the story.

Fitzpatrick also said that it appeared that various hypothetical situations he had outlined to Robertson had been adapted in the story to appear as if they had actually transpired.

"It was surprising to me that in a scenario where I would describe these things and then he would go and confirm these and 100 percent of what I described was confirmed by sources," was how he put it.

And he hinted that the report may have cited him as an anonymous source at a different point in the story from the place where he was quoted.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

10 SIMPLE TIPS TO PROTECT YOUR ORGANISATION FROM RANSOMWARE

Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect