"amdflaws.com" - What is this?

FIVR

Diamond Member
Jun 1, 2016
3,753
911
106
https://www.amdflaws.com


The website claims to be some kind of consumer advocacy site that says it found all sorts of flaws in AMD products and claims that "people should consider using products other than AMD's in mission critical products".

It seems like a total hit job. I hope Lisa Su makes an announcement addressing this soon. Anybody else seen anything like this before?


Edit: They even take swipes at ASUS

AMD’s outsource partner, ASMedia, is a subsidiary of ASUSTeK Computer, a company with poor security track record that has been penalized by the Federal Trade Commission for neglecting security vulnerabilities, and must now undergo independent security audits for the next 20 years.
 

NTMBK

Lifer
Nov 14, 2011
10,269
5,134
136
The researchers gave AMD less than 24 hours to look at the vulnerabilities and respond before publishing the report. Standard vulnerability disclosure calls for 90 days notice, so companies have time to address flaws properly.

"At AMD, security is a top priority and we are continually working to ensure the safety of our users as new risks arise. We are investigating this report, which we just received, to understand the methodology and merit of the findings," an AMD spokesman said.

https://www.cnet.com/news/amd-has-a-spectre-meltdown-like-security-flaw-of-its-own/

I'll wait for third party confirmation of the issues before panicking. If it's legit, then it's very bad for AMD- but these guys seem more than a little shady.
 

FIVR

Diamond Member
Jun 1, 2016
3,753
911
106
The white paper ends by saying all of these vulnerabilities require admin-level privileges. So... basically nothing like Spectre or Meltdown. The whole thing is plastered with marketing slogans and AMD logos and they even make recommendations for using other companies products. It looks like a brochure for a video game. This seems like a total hit job.
 

NTMBK

Lifer
Nov 14, 2011
10,269
5,134
136
The white paper ends by saying all of these vulnerabilities require admin-level privileges. So... basically nothing like Spectre or Meltdown. The whole thing is plastered with marketing slogans and AMD logos and they even make recommendations for using other companies products. It looks like a brochure for a video game. This seems like a total hit job.

So if you've already pwned the system, you can pwn it? Cool exploit.
 

Glo.

Diamond Member
Apr 25, 2015
5,761
4,666
136
I am wondering - who is actually responsible, and connected to this site...?

Because it appears like the same type marketing Intel did with their "4 CPUs glued together on single package" mud slinging marketing.
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
So "CTS-Labs" shows up on Wayback machine back in 2012, and doesn't even look like they had anything (but a lot of references to Telemarketing). Suddenly, in January of 2018, their current home page appears.

A Security Firm pops up its presence almost overnight, with no mention of clients, accolades, or really even an explanation of what they do except for some generic statements about various offerings for security testing. Note that all these offerings lead to extremely sparse pages that use other links from other random websites to provide evidence.

Then they create amdflaws.com which looks like a total mud-slinging effort against AMD. Then they give AMD less than 24 hours to respond vs. the months Intel was provided for Meltdown / Spectre?

This looks nothing like Meltdown / Spectre. This looks shady as all hell. Even if these vulnerabilities turn out to be true, this is a completely unprofessional downright disgusting effort by CTS-Labs, which casts them in an even worse light as a Security Company. Why would a security company with almost no historic foothold in the industry crush some of the most basic disclosure tenants in the industry? Just a lot of stuff not adding up here.
 

Hitman928

Diamond Member
Apr 15, 2012
5,595
8,783
136
Is this standard for a legal disclaimer in this type of whitepaper?

CTS-Labs said:
Although we strive for accuracy and completeness to support our opinions, and we have a good faith belief in everything we write, all such information is presented "as is," without warranty of any kind whether express or implied and CTS does not accept responsibility for errors or omissions. CTS reserves the right to change the contents of this White Paper and the restrictions on its use, with or without notice, and CTS reserves the right to refrain from updating this White Paper even as it becomes outdated or inaccurate.
 

Glo.

Diamond Member
Apr 25, 2015
5,761
4,666
136
So "CTS-Labs" shows up on Wayback machine back in 2012, and doesn't even look like they had anything (but a lot of references to Telemarketing). Suddenly, in January of 2018, their current home page appears.

A Security Firm pops up its presence almost overnight, with no mention of clients, accolades, or really even an explanation of what they do except for some generic statements about various offerings for security testing. Note that all these offerings lead to extremely sparse pages that use other links from other random websites to provide evidence.

Then they create amdflaws.com which looks like a total mud-slinging effort against AMD. Then they give AMD less than 24 hours to respond vs. the months Intel was provided for Meltdown / Spectre?

This looks nothing like Meltdown / Spectre. This looks shady as all hell. Even if these vulnerabilities turn out to be true, this is a completely unprofessional downright disgusting effort by CTS-Labs, which casts them in an even worse light as a Security Company. Why would a security company with almost no historic foothold in the industry crush some of the most basic disclosure tenants in the industry? Just a lot of stuff not adding up here.
As Ashraf Eassa said on Twitter: "Follow the money" .
 

realibrad

Lifer
Oct 18, 2013
12,337
898
126
So here is what I found so far.

CFO of CTS-Labs
https://www.linkedin.com/in/yaron-luk-zilberman-09a1795

Former employment
NineWells Capital Management
'NineWells Capital Management, LLC is a privately owned investment manager. The firm manages hedge funds for its clients. NineWells Capital Management is based in New York, New York."

It sure looks like an attempt to drop the stock price.

From Cnet
"When those two security flaws were announced in January, AMD said it was not affected because of the differences in its architecture. These new security vulnerabilities break down into four categories, according to CTS-Labs co-founder and Chief Financial Officer Yaron Luk-Zilberman.

All of the vulnerabilities essentially allow an attacker to target the secure processor, which is crucial to protecting the sensitive information on your device.

"You're virtually undetectable when you're sitting in the secure processor," Luk-Zilberman said. "An attacker could sit there for years without ever being detected."

So you have a CFO from a tech security company that used to work for an investment company tanking the stock price of AMD.
 

Glo.

Diamond Member
Apr 25, 2015
5,761
4,666
136
Guys, just take a second, for a step back, and think, what will happen when/if it will be proven that this mud slinging attempt was payed by someone to bash AMD?

I have no idea who has so dumb idiots in its marketing department. But the amount of targets for this is very narrow...
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
It gets richer. There's also another CTSLabs website http://www.ctslabsinc.com/index.html who apparently make salves, tonics, and other generic stuff that seems to border on the line of Homeopathy. Not a big deal right? Could just be a completely different company that's located in Greenville, OH vs. Tel Aviv. Except that their CFO, Yaron Luk-Zilberman is listed on Linked-In as an employee on the CTS Labs Profile that has the above link: https://www.linkedin.com/company/cts-labs-inc

So why is the CFO of a high end Security Company like CTS Labs (located in Israel) also listed as an employee of a tonic and lotion company in Greenville, OH by nearly the same name that makes its web pages off of Yahoo Sitebuilder that looks like a throwback to the 90s?

<!--$sitebuilder version="2.9.0" extra="Java(1.8.0_71)" md5="cdc12eff0f737de716161caacf6caaec"$-->
<!--$templateKey Religious|Sunset - Navy|2.0$-->

Something continues to seem really really strange about all this.
 

zinfamous

No Lifer
Jul 12, 2006
110,805
29,556
146
Oh wow.

Also strange that CNET was so quick to run with this, eh? I haven't had much use for CNET in years, but I only because I thought of them as mostly useless, advertisement-driven pablum when it came to tech reviews. This would be the first time I would consider them jumping extremely quickly onto something so thoroughly shady.
 
Reactions: eton975

NTMBK

Lifer
Nov 14, 2011
10,269
5,134
136
And here's the other half of the hatchet job:

In light of CTS’s discoveries, the meteoric rise of AMD’s stock price now appears to be totally unjustified and entirely unsustainable. We believe AMD is worth $0.00 and will have no choice but to file for Chapter 11 (Bankruptcy) in order to effectively deal with the repercussions of recent discoveries.
https://viceroyresearch.org/2018/03/13/amd-the-obituary/
 

Hitman928

Diamond Member
Apr 15, 2012
5,595
8,783
136
So why is the CFO of a high end Security Company like CTS Labs (located in Israel) also listed as an employee of a tonic and lotion company in Greenville, OH by nearly the same name that makes its web pages off of Yahoo Sitebuilder that looks like a throwback to the 90s?

That's probably just a linked-in mistake. When he created his new job on linked in he probably just typed out cts labs and then clicked on the first company that came up, not realizing it wasn't the right one. Obviously I don't know this for sure but I've had friends that have made this mistake before.
 

thecoolnessrune

Diamond Member
Jun 8, 2005
9,673
580
126
That's probably just a linked-in mistake. When he created his new job on linked in he probably just typed out cts labs and then clicked on the first company that came up, not realizing it wasn't the right one. Obviously I don't know this for sure but I've had friends that have made this mistake before.

I can agree it could be a mistake on his part, but you can see those companies as part of your profile. Why would the CFO of a Security Firm leave such a basic mistake for at least a year? You would think there would have been a little oversight or caution.
 

zinfamous

No Lifer
Jul 12, 2006
110,805
29,556
146

heh, I wouldn't be surprised if this was more of a project from one of Goldman's teams, as they seem to be rather involved in AMD stock manipulation for the last couple of years, at least: constantly lowering valuations, then buying up huge chunks. Again and again.

Or not just Goldman: a direct manipulation scheme for any kind of fun or investment bank; not so much Intel or actual competitors. ....this would be catastrophically stupid of Intel to attempt such a thing, obviously.
 

Hitman928

Diamond Member
Apr 15, 2012
5,595
8,783
136
Grabbed this from reddit as I don't have time to go through the whole whitepaper so I don't know if accurate, but based on comments from others who have at least browsed through it, it seems accurate.

Basically, these vulnerabilities come down to, if you completely own the system with privilege to do whatever you want, you can then further and needlessly exploit the system through included AMD hardware.

From reddit said:
MASTERKEY: Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update.
RYZENFALL: Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
FALLOUT: Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
CHIMERA: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |