Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty

A broken lock on a PCB.
(Image credit: Shutterstock)

It was possible to download sensitive information about 270,000 Intel employees until the end of February, according to Eaton Z, a security researcher, reverse engineer, and application developer. All this information was available with a little 'valid user' dodge applied to the Intel India Operations (IIO) site, where employees usually order their business cards. The vulnerability behind the potential hack, dubbed ‘Intel Outside’ by the researcher, was detailed to Intel in correspondence starting in October 2024. Moreover, the business card site was just one of four found with gaping security flaws.

How the hack worked: “The fancier the background, the more ineffective the login page will be”

Eaton explains that after their first scouting of the perimeter, they decided to check the JavaScript files behind the business card login form. It is sometimes possible “to trick an application into thinking a valid user is logged in by modifying the getAllAccounts function to return a non-empty array,” Eaton narrated. Indeed, this worked and got Eaton past the login screen.

Next, it was observed that the website, at this depth, allowed for the probing of a long list of employees, not restricted to India, but worldwide. An API token, which was available to an anonymous user (like Eaton), provided even deeper access to the employee data.

Subsequently, Eaton was alarmed by the amount of information that could be pulled up about every employee. “Way more than this simple website would ever need,” they commented, “Intel’s APIs are very generous!”

Things got worse for Intel, not for Eaton. Removing the URL filter from the API being probed eventually yielded “a nearly 1GB JSON file.” Inside this download, Eaton noted that there were details of every Intel employee (there are fewer now). Data included fields like each employee’s name, role, manager, phone number, and mailing address.

Three other Intel websites were blown wide open by gentle prying

Eaton’s work tested the locks, listening for the clicks, on several other Intel websites. Perhaps you will be surprised to hear that three other vulnerable Intel Outside style hacks were possible?

On the internal ‘Product Hierarchy’ website, Eaton discovered easily decryptable hardcoded credentials. Again, the prize was a bumper list of Intel employee data, as well as the possibility to gain admin access to the system. Similarly, Intel’s internal ‘Product Onboarding’ suffered from easily decryptable hardcoded credentials.

The corporate login on Intel’s SEIMS Supplier Site was another security measure that could be bypassed. It delivered an amazing fourth way in which an attacker could “download the details of every Intel employee,” says Eaton.

All right now

Eaton communicated with Intel, outlining the internal website flaws that had been discovered, starting from October 2024. Sadly, none of Eaton’s work qualified for Intel bug bounty payouts, as it was excluded by some small print. Perhaps even worse, Eaton only got a single canned ‘auto-response’ from Intel throughout the whole process.

Easton noticed that all the vulnerabilities he had uncovered and reported to Intel had been addressed by February 28 this year. Publishing the linked blog on August 18, thus, seems eminently reasonable.

Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

TOPICS
Mark Tyson
News Editor

Mark Tyson is a news editor at Tom's Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.

  • cyrusfox
    Hopefully his efforts are rewarded, ethical hacking and preventing future data leaks, worthy of formal recognition, even if not monetarily. Either way Karmically Eaton is a good guy, and will find out that doing good is its own reward, and not the inverse, no good deed goes unpunished.
    Reply
  • TechieTwo
    Does this stuff really surprise anyone? It's absurd and inexcusable.
    Reply
  • Marlin1975
    So moral of the story, sell your intel data leaks/vulnerabilities on the Dark Web as their bug bounty does not pay.
    Got it.
    Reply
  • Skramblr
    They download the info found on business cards employees hand out to everyone? OK.
    Reply
  • Former Intel Employee
    I worked for Intel from 1993 till 2004. Recently I lost my job and subsequently lost insurance for my wife and I. My wife has been disabled since 2000 and therefore was eligible for Medicare however since I maintained employer provided healthcare for us both until I lost me job, there was no reason to sign up and pay a Medicare premium for my wife. Once we both lost employee healthcare I went to sign my wife up to Medicare and one requirement was to prove she had uninterrupted employer provided coverage all the way back to 2000, the year she was declared officially disabled. For each year she could not prove coverage, she would be penalized 10% annually for her Medicare premium for each year she failed to prove she had coverage. This would be for the rest of her life. After speaking with the Medicare folks, the told us we needed a letter from all my employers attesting my wife was covered by my employer sponsored health plan. This was no problem with any of my employers with the exception of Intel. Although I worked for Intel for 11 years, they had zero record of my employment. I tried to escalate to their HR people and they promised callbacks many times but never did.

    No wonder Intel is in such bad financial trouble. They can't even keep records of prior employees. I wonder if my employee info was located in the database that got breached?
    Reply
  • BigHackAttack
    Skramblr said:
    They download the info found on business cards employees hand out to everyone? OK.
    Couldn't be bothered to read the article? OK.
    Reply
  • TerryLaze
    Former Intel Employee said:
    Although I worked for Intel for 11 years, they had zero record of my employment. I tried to escalate to their HR people and they promised callbacks many times but never did.
    The question is why don't you have any record of your employment at intel?!
    Every employee has an internal employee number.
    Or any record of your wife receiving Medicare for 11 years? A disabled person didn't need anything for 11 years?
    Also letters?!?!?!?!? Seriously?!
    Reply
  • Former Intel Employee
    TerryLaze said:
    The question is why don't you have any record of your employment at intel?!
    Every employee has an internal employee number.
    Or any record of your wife receiving Medicare for 11 years? A disabled person didn't need anything for 11 years?
    Also letters?!?!?!?!? Seriously?!
    Reply
  • Former Intel Employee
    I actually had stuff like paystubs from over 19 years ago but that wasn't sufficient for the folks at Medicare. They need a note from the employer indicating my wife was covered from the time she became eligible for Medicare (2000) until I separated from service at Intel (2004).

    I knew my WWID but when I gave that to Intel they said they had no records back that far. That was 19 years ago.

    Lastly, like I said, i didnt want to pay for her to receive medicare while I was still employed. Realize even people who just receive Medicare A and B have to pay a monthly premium. It make no sense to do that when she got coverage from my employer.
    Reply
  • thekingofALLmonkz
    As compensation, Eaton was given an Intel® water bottle and personally handed a "certificate of loyalty" sticker by a local Intel sales representative
    Reply