Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not really, neither this nor the original article claimed it was done on a mass sale (ie. every machine coming off the line). It was likely only done to juicy targets only.


So, what, some time after the line, after a sale was made, during fulfillment, a Chinese super-spy managed to open up specific server that the juicy target was getting and solder some special chip onto the board somehow in a way that worked instead of bricking the board?

I mean, honestly, hats off if that's the case. That would be pretty cool. But you need actual evidence for such a tale.


>So, what, some time after the line, after a sale was made, during fulfillment, a Chinese super-spy managed to open up specific server that the juicy target was getting and solder some special chip onto the board somehow in a way that worked instead of bricking the board?

I'm not sure why you're implying that you need a super-spy to pull this off. If this was done at the factory level they likely had access to the same manufacturing equipment used to make the motherboards, so there's no need to manually solder anything. The implant was alleged to be a surface-mount component so it could be as simple as reprogramming the pick-and-place machine or swaping out the reels. Given that this is china enlisting a couple of technicians to your cause wouldn't be too hard[1]. From there once they figure out a particular order is going to a juicy target they can ship the bugged boards in place of the untampered boards.

> But you need actual evidence for such a tale.

Agreed. My main takeway from the article is that this hack could happen, not necessarily that it has happened.

[1] it's not unlike the concerns that there are NSA backdoors in intel cpus (eg. AMT/vpro, or RDRAND), or windows (NSAKEY).


> I'm not sure why you're implying that you need a super-spy to pull this off.

The factory doesn't have assembly lines marked like 'for apple', 'for the nsa'. It's just an assembly line making a bunch of identical boards. You'd have to identify a specific board way after it's left the assembly line, and probably after being integrated into a chassis to put your spy chip on it if it's targeted at a specific customer.


The way we in the West do it is intercept the shipment en route and make modifications in a special facility. TAO have significant hardware capabilities and do this stuff routinely.

It's not some giant leap of the imagination.


So what you are saying is that they (China?) can and do intercept shipments from Supermicro inside the US? Or how do you get the chip onto the correct piece of hardware when you don't know where each motherboard ends up when it leaves the factory?



1. Make a batch of bugged boards

2. Wait for an order from apple

3. Add the bugged boards

If the warehouses and manufacturing lines are all in China (as is the case with just in time manufacturing) I don't see why this is difficult to pull off.


I'd expect shipments across the Pacific to be aggregated into the smallest possible number of containers and only subdivided into batches for individual customers at the last possible moment, in order to minimize both transportation cost and the risk that any single customer loses their entire order when a container falls off the ship.

Is that not how it works? If so, I'd like to know why.


That'd depend on how the shipping is done. What you described would apply for something like retail, where the factory only deals/sells to a distributor (stateside), which then sells/ship them to retailers. Under that setup it would be hard to accurately predict where a particular motherboard would end up at the factory. However, I suspect for large orders, they won't bother with that and would send an entire shipping container or pallet to the customer straight from the factory.


Google “NSA Interdiction”, tons of news articles detailing them “upgrading” target shipments of laptops, networking gear, and other electronics.


> a Chinese super-spy managed to open up specific server that the juicy target was getting and solder some special chip onto the board ...

That's pretty much it (if the story is not bullshit). That, or cooperation from Supermicro or whoever was their distributor to the target.


Surely a "juicy target" then would have sufficient resources to confirm or deny this? Last time this came out though, both Apple and Amazon -- who use SuperMicro servers -- explicitly denied that the servers were compromised.


I’m surprised you are surprised by this. Did you expect them to admit their servers were compromised?


The admitted it when they discovered the NSA was tapping their fiber links. They not only admitted it, they were furious, and encrypted all their internal traffic.

What's more, they didn't just keep quiet, they made very strong public denials, the kind that would result in SEC and shareholder lawsuits if they were proven to be false.


From the outside Apple (the company) looks to be a lot more subservient when it comes to its relations with China compared with its relations with the US government. Parts of the second one can be bought/lobbied almost all the way to the top, China is a little bit more challenging for a Western company, there's Xi and a handful of his underlings who can decide your future as a company on the mainland.


China reacts differently than the US. If you publicly bad mouth the Chinese government there are consequences.

Contrast this to a public showing of anger against the NSA which is beneficial to the company and to the NSA. The NSA wants users to feel secure and not take other measures.

Shareholders can sue for anything (everything is securities fraud), the act of exposing client details to the NSA without telling shareholders is no less problematic than continuing to lie to shareholders about dealings with the NSA.


On one hand, no, but on the other hand I would expect that they preempt inevitable leaks of such information.


I would go through zero-day bug instead of this. If one can build a single chip which read sensitive data from hard disk, steal private key from main memory, and send data via the ethernet port, that chip must have a lot of pins connecting to pcie bus, qpi etc., and super complex. This super spy chip must use the latest technology to build such as TSMC which is not possible in mainland China.


>If one can build a single chip which read sensitive data from hard disk, steal private key from main memory, and send data via the ethernet port, that chip must have a lot of pins connecting to pcie bus, qpi etc., and super complex.

Nope, if you read the original article the chip is much simpler than what you described.

>the primary role of implants such as these is to open doors that other attackers can go through. [...] In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.


These buses are operating at gigahertz speeds with nanosecond timings. You would need cutting edge chips to do that. The note is correct. They could of course be manufactured, but it would very hard and very noticeable.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: