A cybersecurity expert determined that the telecom company's server was modified at the factory where it was manufactured in Guangzhou, China. Reuters
A cybersecurity expert determined that the telecom company's server was modified at the factory where it was manufactured in Guangzhou, China. Reuters
A cybersecurity expert determined that the telecom company's server was modified at the factory where it was manufactured in Guangzhou, China. Reuters
A cybersecurity expert determined that the telecom company's server was modified at the factory where it was manufactured in Guangzhou, China. Reuters

Fresh evidence of China hacking hardware found in US telecom


  • English
  • Arabic

A major US telecommunications company discovered manipulated hardware from Super Micro Computer in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the US, according to a security expert working for the telecom company.

The security expert, Yossi Appleboum, provided documents, analysis and other evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015.

Mr Appleboum previously worked in the technology unit of the Israeli Army Intelligence Corps and is now co-chief executive officer of Sepio Systems in Gaithersburg, Maryland. His firm specialises in hardware security and was hired to scan several large data centres belonging to the telecommunications company. Bloomberg is not identifying the company due to Mr Appleboum’s nondisclosure agreement with the client. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector, a component that's used to attach network cables to the computer, Mr Appleboum said.

The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. Mr Appleboum said his concern is that there are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. “That's the problem with the Chinese supply chain,” he said.

Supermicro, based in San Jose, California, gave this statement: “The security of our customers and the integrity of our products are core to our business and our company values. We take care to secure the integrity of our products throughout the manufacturing process, and supply chain security is an important topic of discussion for our industry. We still have no knowledge of any unauthorised components and have not been informed by any customer that such components have been found. We are dismayed that Bloomberg would give us only limited information, no documentation, and half a day to respond to these new allegations.”

Bloomberg News first contacted Supermicro for comment on this story on Monday at 9.23am Eastern time and gave the company 24 hours to respond.

_______________

Read more:

Suspected Iranian hackers target Saudi, US and Korean industries

Iran hackers ramping up attacks on Gulf energy firms

_______________

Supermicro said after the earlier story that it “strongly refutes” reports that servers it sold to customers contained malicious microchips. China's embassy in Washington did not return a request for comment Monday. In response to the earlier Bloomberg Businessweek investigation, China’s Ministry of Foreign Affairs didn’t directly address questions about the manipulation of Supermicro servers but said supply chain security is “an issue of common concern, and China is also a victim”.

Supermicro shares plunged 41 per cent last Thursday, the most since it became a public company in 2007, following the revelations about the hacked servers. They fell as much as 27 per cent on Tuesday after the latest story.

The more recent manipulation is different from the one described in the Bloomberg Businessweek report last week, but it shares key characteristics: They’re both designed to give attackers invisible access to data on a computer network in which the server is installed; and the alterations were found to have been made at the factory as the motherboard was being produced by a Supermicro subcontractor in China.

Based on his inspection of the device, Mr Appleboum determined that the telecom company's server was modified at the factory where it was manufactured. He said that he was told by Western intelligence contacts that the device was made at a Supermicro subcontractor factory in Guangzhou, a port city in southeastern China. Guangzhou is 145 kilometres upstream from Shenzhen, dubbed the `Silicon Valley of Hardware,’ and home to giants such as Tencent and Huawei.

The tampered hardware was found in a facility that had large numbers of Supermicro servers, and the telecommunication company's technicians couldn’t answer what kind of data was pulsing through the infected one, said Mr Appleboum, who accompanied them for a visual inspection of the machine. It's not clear if the telecommunications company contacted the FBI about the discovery. An FBI spokeswoman declined to comment on whether it was aware of the finding.

AT&T spokesman Fletcher Cook said, “These devices are not part of our network, and we are not affected.” A Verizon spokesman said “we’re not affected”.

"Sprint does not have Supermicro equipment deployed in our network," said Lisa Belot, a Sprint spokeswoman. T-Mobile didn’t respond to requests for comment. Sepio Systems’ board includes chairman Tamir Pardo, former director of the Israeli Mossad, the national defense agency of Israel, and its advisory board includes Robert Bigman, former chief information security officer of the US Central Intelligence Agency.

US communications networks are an important target of foreign intelligence agencies, because data from millions of mobile phones, computers and other devices pass through their systems. Hardware implants are key tools used to create covert openings into those networks, perform reconnaissance and hunt for corporate intellectual property or government secrets.

The manipulation of the Ethernet connector appeared to be similar to a method also used by the US National Security Agency, details of which were leaked in 2013. In e-mails, Mr Appleboum and his team refer to the implant as their “old friend”, because he said they had previously seen several variations in investigations of hardware made by other companies manufacturing in China.

In Bloomberg Businessweek’s report, one official said investigators found that the Chinese infiltration through Supermicro reached almost 30 companies, including Amazon and Apple. Both Amazon and Apple also disputed the findings. The US Department of Homeland Security said it has “no reason to doubt” the companies’ denials.

_______________

Read more:

Facebook says security breach affected about 50 million accounts

Hacker to live-stream attack on Zuckerberg’s Facebook page

_______________

People familiar with the federal investigation into the 2014-2015 attacks say that it is being led by the FBI's cyber and counterintelligence teams, and that DHS may not have been involved. Counterintelligence investigations are among the FBI's most closely held and few officials and agencies outside of those units are briefed on the existence of those investigations.

Mr Appleboum said that he's consulted with intelligence agencies outside the US that have told him they've been tracking the manipulation of Supermicro hardware, and the hardware of other companies, for some time.

The Norwegian National Security Authority said last week that it had been "aware of an issue" connected to Supermicro products since June.

Hardware manipulation is extremely difficult to detect, which is why intelligence agencies invest billions of dollars in such sabotage. The US is known to have extensive programs to seed technology heading to foreign countries with spy implants, based on revelations from former CIA employee Edward Snowden. But China appears to be aggressively deploying its own versions, which take advantage of the grip the country has over global technology manufacturing.

Three security experts who have analysed foreign hardware implants for the US Department of Defense confirmed that the way Sepio's software detected the implant is sound. One of the few ways to identify suspicious hardware is by looking at the lowest levels of network traffic. Those include not only normal network transmissions, but also analog signals - such as power consumption - that can indicate the presence of a covert piece of hardware.

In the case of the telecommunications company, Sepio's technology detected that the tampered Supermicro server actually appeared on the network as two devices in one. The legitimate server was communicating one way, and the implant another, but all the traffic appeared to be coming from the same trusted server, which allowed it to pass through security filters.

Mr Appleboum said one key sign of the implant is that the manipulated Ethernet connector has metal sides instead of the usual plastic ones. The metal is necessary to diffuse heat from the chip hidden inside, which acts like a mini computer. "The module looks really innocent, high quality and 'original' but it was added as part of a supply chain attack," he said.

The goal of hardware implants is to establish a covert staging area within sensitive networks, and that's what Mr Appleboum and his team concluded in this case. They decided it represented a serious security breach, along with multiple rogue electronics also detected on the network, and alerted the client's security team in August, which then removed them for analysis. Once the implant was identified and the server removed, Sepio's team was not able to perform further analysis on the chip.

The threat from hardware implants “is very real”, said Sean Kanuck, who until 2016 was the top cyber official inside the Office of the Director of National Intelligence. He's now director of future conflict and cyber security for the International Institute for Strategic Studies in Washington. Hardware implants can give attackers power that software attacks don’t.

“Manufacturers that overlook this concern are ignoring a potentially serious problem,” Mr Kanuck said. “Capable cyber actors - like the Chinese intelligence and security services - can access the IT supply chain at multiple points to create advanced and persistent subversions.”

One of the keys to any successful hardware attack is altering components that have an ample power supply to them, a daunting challenge the deeper into a motherboard you go. That's why peripherals such as keyboards and mice are also perennial favorites for intelligence agencies to target, Appleboum said.

In the wake of reporting on the attack against Supermicro products, security experts say that teams around the world, from large banks and cloud computing providers to small research labs and startups, are analysing their servers and other hardware for modifications, a stark change from normal practices. Their findings won't necessarily be made public, since hardware manipulation is typically designed to access government and corporate secrets, rather than consumer data.

National security experts say a key problem is that, in a cybersecurity industry approaching $100 billion (Dh367.2bn) in revenue annually, very little of that has been spent on inspecting hardware for tampering. That's allowed intelligence agencies around the world to work relatively unimpeded, with China holding a key advantage.

“For China, these efforts are all-encompassing,” said Tony Lawrence, CEO of VOR Technology, a Columbia, Maryland-based contractor to the intelligence community. “There is no way for us to identify the gravity or the size of these exploits - we don't know until we find some. It could be all over the place - it could be anything coming out of China. The unknown is what gets you and that's where we are now. We don't know the level of exploits within our own systems.”

The%20specs
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3E3.0%20twin-turbo%20inline%20six-cylinder%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3Eeight-speed%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E503hp%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E600Nm%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3Efrom%20Dh400%2C000%20(estimate)%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3Enow%3C%2Fp%3E%0A
How to help

Call the hotline on 0502955999 or send "thenational" to the following numbers:

2289 - Dh10

2252 - Dh50

6025 - Dh20

6027 - Dh100

6026 - Dh200

India Test squad

Kohli (c), Dhawan, Rahul, Vijay, Pujara, Rahane (vc), Karun, Karthik (wk), Rishabh Pant (wk), Ashwin, Jadeja, Kuldeep, Pandya, Ishant, Shami, Umesh, Bumrah, Thakur

MATCH INFO

Mumbai Indians 186-6 (20 ovs)
Kings XI Punjab 183-5 (20 ovs)

Mumbai Indians won by three runs

MATCH INFO

Delhi Daredevils 174-4 (20 ovs)
Mumbai Indians 163 (19.3 ovs)

Delhi won the match by 11 runs

PREMIER LEAGUE FIXTURES

Saturday (UAE kick-off times)

Watford v Leicester City (3.30pm)

Brighton v Arsenal (6pm)

West Ham v Wolves (8.30pm)

Bournemouth v Crystal Palace (10.45pm)

Sunday

Newcastle United v Sheffield United (5pm)

Aston Villa v Chelsea (7.15pm)

Everton v Liverpool (10pm)

Monday

Manchester City v Burnley (11pm)

Women's Prize for Fiction shortlist

The Silence of the Girls by Pat Barker

My Sister, the Serial Killer by Oyinkan Braithwaite

Milkman by Anna Burns

Ordinary People by Diana Evans

An American Marriage by Tayari Jones

Circe by Madeline Miller

The specs: 2018 GMC Terrain

Price, base / as tested: Dh94,600 / Dh159,700

Engine: 2.0-litre turbocharged four-cylinder

Power: 252hp @ 5,500rpm

Torque: 353Nm @ 2,500rpm

Transmission: Nine-speed automatic

Fuel consumption, combined: 7.4L  / 100km

Our legal consultant

Name: Hassan Mohsen Elhais

Position: legal consultant with Al Rowaad Advocates and Legal Consultants.

MATCH INFO

What: India v Afghanistan, first Test
When: Starts Thursday
Where: M Chinnaswamy Stadium, Bengalaru

Three ways to boost your credit score

Marwan Lutfi says the core fundamentals that drive better payment behaviour and can improve your credit score are:

1. Make sure you make your payments on time;

2. Limit the number of products you borrow on: the more loans and credit cards you have, the more it will affect your credit score;

3. Don't max out all your debts: how much you maximise those credit facilities will have an impact. If you have five credit cards and utilise 90 per cent of that credit, it will negatively affect your score.

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20myZoi%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202021%3Cbr%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20Syed%20Ali%2C%20Christian%20Buchholz%2C%20Shanawaz%20Rouf%2C%20Arsalan%20Siddiqui%2C%20Nabid%20Hassan%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20UAE%3Cbr%3E%3Cstrong%3ENumber%20of%20staff%3A%3C%2Fstrong%3E%2037%3Cbr%3E%3Cstrong%3EInvestment%3A%3C%2Fstrong%3E%20Initial%20undisclosed%20funding%20from%20SC%20Ventures%3B%20second%20round%20of%20funding%20totalling%20%2414%20million%20from%20a%20consortium%20of%20SBI%2C%20a%20Japanese%20VC%20firm%2C%20and%20SC%20Venture%3C%2Fp%3E%0A
What are the GCSE grade equivalents?
 
  • Grade 9 = above an A*
  • Grade 8 = between grades A* and A
  • Grade 7 = grade A
  • Grade 6 = just above a grade B
  • Grade 5 = between grades B and C
  • Grade 4 = grade C
  • Grade 3 = between grades D and E
  • Grade 2 = between grades E and F
  • Grade 1 = between grades F and G

Gorillaz 
The Now Now 

'Outclassed in Kuwait'
Taleb Alrefai, 
HBKU Press 

UAE currency: the story behind the money in your pockets
The specs: 2019 Jeep Wrangler

Price, base: Dh132,000

Engine: 3.6-litre V6

Gearbox: Eight-speed automatic

Power: 285hp @ 6,400rpm

Torque: 347Nm @ 4,100rpm

Fuel economy, combined: 9.6L to 10.3L / 100km

Real estate tokenisation project

Dubai launched the pilot phase of its real estate tokenisation project last month.

The initiative focuses on converting real estate assets into digital tokens recorded on blockchain technology and helps in streamlining the process of buying, selling and investing, the Dubai Land Department said.

Dubai’s real estate tokenisation market is projected to reach Dh60 billion ($16.33 billion) by 2033, representing 7 per cent of the emirate’s total property transactions, according to the DLD.

The%20specs
%3Cp%3E%3Cstrong%3EEngine%3A%20%3C%2Fstrong%3E2.3-litre%204cyl%20turbo%0D%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E299hp%20at%205%2C500rpm%0D%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E420Nm%20at%202%2C750rpm%0D%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3E10-speed%20auto%0D%3Cbr%3E%3Cstrong%3EFuel%20consumption%3A%20%3C%2Fstrong%3E12.4L%2F100km%0D%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3ENow%0D%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3EFrom%20Dh157%2C395%20(XLS)%3B%20Dh199%2C395%20(Limited)%3C%2Fp%3E%0A
India squad for fourth and fifth Tests

Kohli (c), Dhawan, Rahul, Shaw, Pujara, Rahane (vc), Karun, Karthik (wk), Pant (wk), Ashwin, Jadeja, Pandya, Ishant, Shami, Umesh, Bumrah, Thakur, Vihari

MEYDAN RESULTS

6.30pm Baniyas (PA) Group 2 Dh125,000 (Dirt) 1,400m

Winner ES Ajeeb, Sam Hitchcock (jockey), Ibrahim Aseel (trainer).          

7.05pm Maiden (TB) Dh165,000 (D) 1,200m

Winner  Galaxy Road, Antonio Fresu, Musabah Al Muhairi.

7.40pm Maiden (TB) Dh165,000 (D) 1,400m

Winner  Al Modayar, Fernando Jara, Ali Rashid Al Raihe.

8.15pm Handicap (TB) Dh170,000 (D) 1,900m

Winner  Gundogdu, Xavier Ziani, Salem bin Ghadayer.

8.50pm Rated Conditions (TB) Dh240,000 (D) 1,600m

Winner George Villiers, Tadhg O’Shea, Satish Seemar.

9.25pm Handicap (TB) Dh175,000 (D)1,200m

Winner  Lady Parma, Connor Beasley, Satish Seemar

10pm Handicap (TB) Dh165,000 (D) 1,400m

Winner Zaajer, Fernando Jara, Ali Rashid Al Raihe

Lexus LX700h specs

Engine: 3.4-litre twin-turbo V6 plus supplementary electric motor

Power: 464hp at 5,200rpm

Torque: 790Nm from 2,000-3,600rpm

Transmission: 10-speed auto

Fuel consumption: 11.7L/100km

On sale: Now

Price: From Dh590,000

MATCH INFO

Syria v Australia
2018 World Cup qualifying: Asia fourth round play-off first leg
Venue: Hang Jebat Stadium (Malacca, Malayisa)
Kick-off: Thursday, 4.30pm (UAE)
Watch: beIN Sports HD

* Second leg in Australia scheduled for October 10

The%20specs
%3Cp%3E%3Cstrong%3EEngine%3A%3C%2Fstrong%3E%201.5-litre%204-cylinder%3Cbr%3E%3Cstrong%3ETransmission%3A%20%3C%2Fstrong%3ECVT%3Cbr%3E%3Cstrong%3EPower%3A%20%3C%2Fstrong%3E119bhp%3Cbr%3E%3Cstrong%3ETorque%3A%20%3C%2Fstrong%3E145Nm%3Cbr%3E%3Cstrong%3EPrice%3A%20%3C%2Fstrong%3EDh%2C89%2C900%20(%2424%2C230)%3Cbr%3E%3Cstrong%3EOn%20sale%3A%20%3C%2Fstrong%3Enow%3C%2Fp%3E%0A

Springtime in a Broken Mirror,
Mario Benedetti, Penguin Modern Classics

 

Bangladesh tour of Pakistan

January 24 – First T20, Lahore

January 25 – Second T20, Lahore

January 27 – Third T20, Lahore

February 7-11 – First Test, Rawalpindi

April 3 – One-off ODI, Karachi

April 5-9 – Second Test, Karachi

Ms Yang's top tips for parents new to the UAE
  1. Join parent networks
  2. Look beyond school fees
  3. Keep an open mind
The Bloomberg Billionaire Index in full

1 Jeff Bezos $140 billion
2 Bill Gates $98.3 billion
3 Bernard Arnault $83.1 billion
4 Warren Buffett $83 billion
5 Amancio Ortega $67.9 billion
6 Mark Zuckerberg $67.3 billion
7 Larry Page $56.8 billion
8 Larry Ellison $56.1 billion
9 Sergey Brin $55.2 billion
10 Carlos Slim $55.2 billion

Living in...

This article is part of a guide on where to live in the UAE. Our reporters will profile some of the country’s most desirable districts, provide an estimate of rental prices and introduce you to some of the residents who call each area home.