"amdflaws.com" - What is this?

Page 5 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

krumme

Diamond Member
Oct 9, 2009
5,956
1,595
136
Lmao at Ian Cutress' tweet calling vulnerabilities that require administrator privileges to exploit "real".

I think him not reading his own site is not news unfortunately.

Yeaa can someone explain this to me?

What level of hardware access are we talking here?
What level of admin priviledges?

I mean you need to balance openness vs security in all situations also cpu.
 

moinmoin

Diamond Member
Jun 1, 2017
4,994
7,765
136
Reminder on what "vulnerabilities" we are talking about:
1) MASTERKEY: if you allow unauthorised BIOS updates you are screwed.
Threat level: No shit, Sherlock!

2) RYZENFALL: again, loading unauthorised code on the Secure Processor as admin.
Threat level: No shit, Sherlock!

3) FALLOUT: vendor-supplied *signed* driver allows access to Secure Processor.
Threat level: No shit, Sherlock!

4) CHIMERA¹: outsourced chipset has an internal ucontroller which can be 0wned via digitally signed driver.
__
¹ read about my Chimaera Processor: far sexier stuff.
https://twitter.com/cynicalsecurity/status/973591954096381952
 

USER8000

Golden Member
Jun 23, 2012
1,542
780
136
Lmao at Ian Cutress' tweet calling vulnerabilities that require administrator privileges to exploit "real".

I think him not reading his own site is not news unfortunately.

CTS-Labs are using a public relations firm located in NY. Just saw this on another forum:




http://www.bevelpr.com/expertise/

Our Services
We specialize in a variety of communications areas. Our team of influencers will help you develop a customized communications plan that is uniquely designed to drive success for your business.

143 West 29th Street, 7th Floor
New York, NY 10001
P +1 (917) 819-5738
newyork@bevelpr.com

The chap from trailofbits:

https://twitter.com/dguido

Brooklyn, NY
 

USER8000

Golden Member
Jun 23, 2012
1,542
780
136
Someone needs to tweet Ian Cutress this thread,as its going to be a joke when enthusiasts uncover more of these conflicts of interests than tech journalists.

They seem to be unaware of the dodginess!
 

moinmoin

Diamond Member
Jun 1, 2017
4,994
7,765
136
Linus on g plus https://plus.google.com/+LinusTorvalds


"It looks like the IT security world has hit a new low"
Linus says how it is.
When was the last time you saw a security advisory that was basically "if you replace the BIOS or the CPU microcode with an evil version, you might have a security problem"? Yeah.
No, the real problem is the mindless parroting of the security advisory (it's "Top Story" on at least one tech news site right now), because security is so much more important than anything else, and you can never question it.
"AnandTech - Proud to be part of the problem"
 

xblax

Member
Feb 20, 2017
54
70
61
If any of these flaws are real, most of them could probably be fixed by PSP firmware updates. The only third party backing this up seems to be "Dan Guido" https://twitter.com/dguido - his company looks to be somewhat reputable based on their publications https://www.trailofbits.com/research-and-development/published-research/

But however this turns out, the only purpose of this shady amdflaws.com disclosure was to manipulate the stock marked. This "Viceroy Research" paper [1] is a piece of joke. It was released at the same time these "security flaws" were disclosed. That means they had access long time before AMD was notified. The pepole behind this are criminals and shoud be treated that way. Calling them "Researchers" and giving them any credibility like Ian does in his news report is an insult to anyone doing honest research.

[1] https://viceroyresearch.files.wordpress.com/2018/03/amd-the-obituary-13-mar-2018.pdf
 
Last edited:

USER8000

Golden Member
Jun 23, 2012
1,542
780
136
If any of these flaws are real, most of them could probably be fixed by PSP firmware updates. The only third party backing this up seems to be "Dan Guido" https://twitter.com/dguido - his company looks to be somewhat reputable based on their publications https://www.trailofbits.com/research-and-development/published-research/

But however this turns out, the only purpose of these pulications was to manipulate the stock marked. This "Viceroy Research" paper [1] is a peace of joke. It was released at the same time these "security flaws" were disclosed. That means they had access long time before AMD was notified. The pepole behind this are criminals and shoud be treated that way. Calling them "Researchers" and giving them any credibility like Ian does in his news report is an insult to anyone doing honest research.

[1] https://viceroyresearch.files.wordpress.com/2018/03/amd-the-obituary-13-mar-2018.pdf

It seems too convenient,that they got sent the paper a week before AMD got it,for less than 24 hours,and the CEO worked in the same city for an investment fund and even hired a NY based company for marketing.

Perhaps they need to look at the possibility this outfit is using them for nefarious means.
 

DaveSimmons

Elite Member
Aug 12, 2001
40,730
670
126
My recent CPU purchase was a Coffeelake 8700 and before that a 7700 for work and an i5-2500 for home. Team Intel!

This is a stock manipulation scam. Wildly exaggerated vulnerabilities released without a chance for mitigation by a "security company" that's probably just a sockpupper for a known short-seller.

Ignore it and keep buying Ryzens, you have nothing to worry about unless someone breaks into your house so that they can flash your BIOS with an Evil Twin.
 

USER8000

Golden Member
Jun 23, 2012
1,542
780
136
This has been pointed out on Overclockers UK forums:

https://forums.overclockers.co.uk/t...-vulnerabilites.18814131/page-3#post-31665276
https://forums.overclockers.co.uk/posts/31666030/

website of marketing firm CTS Labs has hired said:
From their website

We specialize in a variety of communications areas. Our team of influencers will help you develop a customized communications plan that is uniquely designed to drive success for your business.


Another bit from their own website:

"We are known for our extensive media relationships and network. Let us connect you with the right reporters, bloggers, analysts and influencers who will understand your business and share your perspective with the markets."

Why would a security outfit need a marketing company which uses influencers??
 
Reactions: DarthKyrie and IEC

Panino Manino

Senior member
Jan 28, 2017
846
1,061
136
It's incredible. They may write at the end that it's all shaddy and suspicious, but nothing prevents the tech sites to publish the news with alarmist clickbait titles.
 
Reactions: eton975

USER8000

Golden Member
Jun 23, 2012
1,542
780
136
This is getting even more dodgier:

https://www.cnbc.com/2018/03/13/reu...israeli-firm-says-it-finds-amd-chip-flaw.html

"March 13 (Reuters) - An Israeli cyber security research firm with six employees on Tuesday said it had found flaws in Advanced Micro Devices microprocessors that made them vulnerable to hacks.

AMD said it was investigating the claims, which were followed by heavy trade in AMD shares. The stock closed up 1 percent to $11.64 after a day of volatile trade. AMD traded between $11.10 and $12.04 following release of the report from Tel Aviv-based CTS Labs.

CTS executives told Reuters that they had shared their findings with some clients who pay the firm for proprietary research on vulnerabilities in computer hardware. They declined to identify their clients or say when they had provided them with data on the vulnerability.

"I cant really talk about my clients," said Yaron Luk-Zilberman, chief financial officer at the firm that was founded in January 2017.

Short-seller Viceroy Research published a 25-page report on the vulnerabilities on Tuesday, betting its shares will fall.

AMD said that the report took it by surprise.

"This company was previously unknown to AMD and we find it unusual for a security firm to publish its research to the press without providing a reasonable amount of time for the company to investigate and address its findings," AMD said in a note to customers on its website.

Viceroy founder Fraser Perring told Reuters that somebody anonymously emailed him a draft of the report at about 4 p.m. on Monday. The firm spent much of the evening analyzing the situation and ended up taking a "sizeable" short position in AMD, he said.

There has been increased investor interest in AMD since the beginning of the month, with options drawing large trades that appeared to be betting on increased near-term gyrations in the shares.

Puts, options contracts that protect against a drop in the share price, were particularly active. Last week, the cumulative number of open put contracts outnumbered open calls 1.5-to-1, the most defensive this measure has been in more than two years, according to options analytics firm Trade Alert data. That measure declined slightly by Tuesday.

On Friday and Monday, short selling of AMD's stock increased by about 15 million shares, according to S3 Partners, a financial analytics firm. That brought overall short interest in the chipmaker to about 180 million shares, the most since at least 2010.

"Over the last several days there was a spike in short selling that was completely out of the norm," said Ihor Dusaniwsky, S3 Partners head of research.

New York-based cyber security firm Trail of Bits told Reuters that it had verified the findings from CTS, which paid $16,000 for a review of the AMD vulnerabilities.

A Trail of Bits analyst spent a week reviewing detailed technical reports from CTS, along with "proof of concept" code that could be used to launch attacks on computers running vulnerable AMD chips, Trail of Bits Chief Executive Dan Guido told Reuters.

"These are real security issues in AMD code and processors" that hackers could exploit to manipulate or steal secure data, he said.

For the attacks to work, an attacker must first obtain administrator access to a targeted network, Guido said. ( Reporting by Jim Finkle in Toronto, Arjun Panchadar; Additional reporting by Noel Randewich in New York, Saqib Ahmed in New York and Shariq Khan in Bengalure; Editing by Susan Thomas and Grant McCool)"
 

DaveSimmons

Elite Member
Aug 12, 2001
40,730
670
126
A Trail of Bits analyst spent a week reviewing detailed technical reports from CTS, along with "proof of concept" code that could be used to launch attacks on computers running vulnerable AMD chips, Trail of Bits Chief Executive Dan Guido told Reuters.

As mentioned by others, he was given this info a week before AMD was. Aside from pointing out how sleazy the (possible sockpuppet) CTS is, that also make me wonder if he is receiving some benefit (like payments) for providing a not-really-impartial confirmation of the alleged flaws.
 
Reactions: DarthKyrie

ao_ika_red

Golden Member
Aug 11, 2016
1,679
715
136
Another funny thing is, unlike Meltdown/Spectre in the past, these vulnerabilities go straight up to mainstream tech-media outlet. I remember some quiet whisper around multiple forums about Meltdown/Spectre before it went live on mainstream media.
 

Panino Manino

Senior member
Jan 28, 2017
846
1,061
136
As mentioned by others, he was given this info a week before AMD was. Aside from pointing out how sleazy the (possible sockpuppet) CTS is, that also make me wonder if he is receiving some benefit (like payments) for providing a not-really-impartial confirmation of the alleged flaws.
He just did a favor for "a mutual friend" in good will.
 

Glo.

Diamond Member
Apr 25, 2015
5,761
4,666
136
I can't believe anandtech ran with this story. Pretty much tells you they will buy anything anti-AMD or pro-intel.
I can actually understand Ian's way of thinking about this. Security concerns lately are hot topic, and very important topic at the same time. No matter how stupid the claims can be - you have to inform about situation.
 

Malogeek

Golden Member
Mar 5, 2017
1,390
778
136
yaktribe.org
The fact that this garbage was posted in the way it was by Anandtech is disturbing. Looks like Ian Cutress had the information for awhile before it was made public. Did he even contact AMD himself or prefer to post a nice dramatic article for page hits?
 

Zstream

Diamond Member
Oct 24, 2005
3,396
277
136
The fact that this garbage was posted in the way it was by Anandtech is disturbing. Looks like Ian Cutress had the information for awhile before it was made public. Did he even contact AMD himself or prefer to post a nice dramatic article for page hits?
I can't bash him for it, but if he knew before AMD, that is bull.
 
Reactions: Glo.

.vodka

Golden Member
Dec 5, 2014
1,203
1,537
136
The fact that this garbage was posted in the way it was by Anandtech is disturbing. Looks like Ian Cutress had the information for awhile before it was made public. Did he even contact AMD himself or prefer to post a nice dramatic article for page hits?

The fact that this crap is still up in the front page is disturbing.

https://twitter.com/IanCutress/status/973598276925689856

More or less every tech site with major reach has been notified here as to who is behind all this insanity. At the very least they should all take it down and apologise.

AMD should sue, scorched earth style, no mercy.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |