Friday, May 17th 2019
Intel Tried to Bribe Dutch University to Suppress Knowledge of MDS Vulnerability
Cybersecurity researchers at the Vrije Universiteit Amsterdam, also known as VU Amsterdam, allege that Intel tried to bribe them to suppress knowledge of the latest processor security vulnerability RIDL (rogue in-flight data load), which the company made public on May 14. Dutch publication Nieuwe Rotterdamsche Courant reports that Intel offered to pay the researchers a USD $40,000 "reward" to allegedly get them to downplay the severity of the vulnerability, and backed their offer with an additional $80,000. The team politely refused both offers.
Intel's security vulnerability bounty program is shrouded in CYA agreements designed to minimize Intel's losses from the discovery of a new vulnerability. Under its terms, once a discoverer accepts the bounty reward, they enter into a NDA (non-disclosure agreement) with Intel, to not disclose their findings or communicate in the regard with any other person or entity than with certain authorized people at Intel. With public knowledge withheld, Intel can work on mitigation and patches against the vulnerability. Intel argues that information of vulnerabilities becoming public before it's had a chance to address them would give the bad guys time to design and spread malware that exploits the vulnerability. This is an argument the people at VU weren't willing to buy, and thus Intel is forced to disclose RIDL even as microcode updates, software updates, and patched hardware are only beginning to come out.Update: (17/05): An Intel spokesperson commented on this story.
Intel contacted us with a statement on this story pertaining to the terms of its bug bounty program:
Sources:
NRC.nl, EverythingIsNorminal (Reddit)
Intel's security vulnerability bounty program is shrouded in CYA agreements designed to minimize Intel's losses from the discovery of a new vulnerability. Under its terms, once a discoverer accepts the bounty reward, they enter into a NDA (non-disclosure agreement) with Intel, to not disclose their findings or communicate in the regard with any other person or entity than with certain authorized people at Intel. With public knowledge withheld, Intel can work on mitigation and patches against the vulnerability. Intel argues that information of vulnerabilities becoming public before it's had a chance to address them would give the bad guys time to design and spread malware that exploits the vulnerability. This is an argument the people at VU weren't willing to buy, and thus Intel is forced to disclose RIDL even as microcode updates, software updates, and patched hardware are only beginning to come out.Update: (17/05): An Intel spokesperson commented on this story.
Intel contacted us with a statement on this story pertaining to the terms of its bug bounty program:
"We [Intel] believe that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities. One of the ways we engage with researchers is through our bug bounty program. We provide a clear overview of our bug bounty program requirements, eligibility and award schedule on our website."
87 Comments on Intel Tried to Bribe Dutch University to Suppress Knowledge of MDS Vulnerability
But don't worry, they are going to save us with GPUs. They will be dirt cheap and better than AMDs.
There is no fix that won't cost IPC degredation.
.....and he began building gpu-a-nators and installing self destruct buttons on everything........
Downplay: get fix out then release now blunted info due to issue being remedied, PR spins it to not look as bad.
After all that is where Intel's profit margins are.
Which therefore made me (and the replies here prove wasn't the only one) go to the original reddit post to try decipher the sequence of events and understand if the "bribe" term was something that made sense in this case, since Intel has a public reward program in place. So, without reading that reddit post, and just considering this short TPU news, it's fair that a reader could have some questions on what actually was happening... "was the 40k+80k the first initial offer from Intel just to make them downplay the problem?", "was it part of a more complex sequence of events where Intel tried to suppress information?", "was the usual reward program even considered in this case and the group just completely refused?"
The rest of my own post was the result of my own findings after reading the reddit page a few times (something I encourage everyone else to do and check if they reach the same scenario and conclusion). Which culminates on a better understanding of what happened and if the "bribe" wording can be applied after all. And the answer is: it can, depending on your point of view of it all and your own judgement of Intel's intentions along the entire process.
TLDR:
1 - information was unclear and insufficient after reading the short TPU article
2 - questions were presented
3 - further basic research reading was done to try understand more
4 - results were presented to answer those questions.
Can't be more clear than this.
Intel: "Hey guys, please lie to the public [underplay severity of exploit] in our favor[so we won't be so screwed with yet another vulnerability in our cpu's] in exchange for money [40k$+80k$]"
Imo it fits the definition of a bribe perfectly. Intel seems to have asked them to lie in exchange for money.
That is of course while assuming that the entire story is true as it's described.
But hen again, considering the security context part of it, in which the said information could eventually publicly persuade hackers into an even more intensive attack towards those vulnerabilities, possibly putting companies who pack Intel hardware into a even more fragile situation, then it's also kind of logical that another 6 months could be for the better good overall. That is, giving more time to spread possible fixes so when things got out to the public most of the affected clients would be already protected. When the group refused, only thing Intel could do was to try make things not so dangerous for their products and their customers/clients, avoiding a possible attack escalation. But for that to happen, the research group would have to agree to something. Question is, what would it take for them to accept?
- accepting just "for the better good" if Intel asked?
- accepting any type of non-monetary favor/benefit for the Uni?
- accepting more money?
Considering they already accepted money $100k for the initial Intel reward program, but refused to wait any longer, then it's fair to assume Intel could at least try offer some more to try get a different type of secondary deal.
Obviously this gets much more complicated and shady when we consider all the possible background intentions for Intel to try downplay the problem and protect itself as a big company (apart from the obvious security one).
If thats true, the program is like a muzzle.