The Big Hack - China Inflitrated Major Businesses Using Microchips

Cristiano

Cosmos Betraying Fiend
Admin
Joined
Sep 19, 2018
Messages
5,807
SL Rez
2002
Joined SLU
Nov 2003
SLU Posts
35836

Kara Spengler

Queer OccupyE9 Sluni-Goon, any/all pronouns
Joined
Sep 20, 2018
Messages
6,140
Location
SL: November RL: DC
SL Rez
2007
Joined SLU
December, 2008
SLU Posts
23289
On the daily show last night he was saying he put false data on his phone in addition to the real data. I assume this was a joke but is not a bad strategy really. I just assume any piece of data I deal with is compromised.
 
  • 1Agree
Reactions: Brenda Archer
Joined
Sep 19, 2018
Messages
6,769
Location
NJ suburb of Philadelphia
SL Rez
2003
SLU Posts
4494
One thing I don't understand about the story is the claim the chip is impossible to detect. It needs to send information back to its creators. If some of these motherboards were in computers meant for internal use only, couldn't the attempt to send packets to the outside world be logged by a router?
 

Lori Claremont

Active member
Joined
Sep 20, 2018
Messages
86
Location
Calgary, Alberta, Canada
One thing I don't understand about the story is the claim the chip is impossible to detect. It needs to send information back to its creators. If some of these motherboards were in computers meant for internal use only, couldn't the attempt to send packets to the outside world be logged by a router?
Unfortunately that presumes that someone is logging those sort of events, and further that someone is looking at those logs.

The chip could make some educated guesses whether or not it's cable to get outside the local network by watching local traffic, or by attempting to contact innocuous locations like google. Then the question is what sort of traffic is it going to send if it does determine it's able to connect to the outside world? I guarantee it's not going to attempt to connect to http://china-intelligence-phonehome.cn, they'll have some innocuous looking domain name it's contacting, likely located at a hosting provider somewhere innocent, which then relays (possibly several times) before the traffic is fully exfiltrated to China.

I'd say "Impossible to detect" is a bit strong, but not necessarily too far off the mark.
 
Joined
Sep 19, 2018
Messages
6,769
Location
NJ suburb of Philadelphia
SL Rez
2003
SLU Posts
4494
That sounds right for the most part. I would hope after a story like this came out that companies the size of Amazon or Apple would put systems in place to catch this. They would just need to put various kinds of hardware they buy into an environment where a router could immediately raise a red flag in the future. Have other computers make outside connections and if any of the computers they are checking make an outside connection do an investigation.
 
  • 1Agree
Reactions: Lori Claremont

Ashiri

√(-1)
Joined
Sep 20, 2018
Messages
936
Location
RL: NZ
SL Rez
2007
SLU Posts
-1
I can believe this could well be true despite the denials, if there is a way of accessing the IME using a tiny microcontroller.
 
  • 1Thanks
Reactions: Brenda Archer