The SDKs that can be downloaded by anyone who works with NXP chips by any chance?Whom exactly said:
“The main objective of these attacks appeared to be stealing intelligence, specifically documents about IC chips, software development kits (SDKs), IC designs, source code, etc.,” Cycraft researchers wrote. “If such documents are successfully stolen, the impact can be devastating.”?
You're right, it's a chipmakermaker.Uh, ASML is not a chipmaker, so NXP can't be the second-biggest after them.
ASML makes equipment that chipmakers buy, not chips.
I was wondering why I had never heard of NCR.The Dutch newspaper is called NRC not NCR.
Long time ago the name was Nieuwe Rotterdamsche Courant. Later it was called NRC Handelsblad after a merger.
The link to the report containing that line is immediately above the paragraph. The quote appears toward the end of the first page of the Introduction section. The report does not include the actual author name(s), attributing it only to "Cycraft Research Team." This is common in the industry.Whom exactly said:
“The main objective of these attacks appeared to be stealing intelligence, specifically documents about IC chips, software development kits (SDKs), IC designs, source code, etc.,” Cycraft researchers wrote. “If such documents are successfully stolen, the impact can be devastating.”?
Detecting nation-state adversaries is difficult, even among the best defenders. You're up against people who have effectively unlimited resources, know about vulnerabilities often years before they're discovered by more open researchers, have anywhere from dozens to hundreds of highly-skilled developers to work around defenses, and can set up extensive labs to test ideas and ensure they won't get caught by any of the available detection engines.Remove the entire board and c suite, and claw back everything they have made, then sue them into poverty.
I'm going to presume this was a joke, but just in case not, let me lay it out in very short sentences:Remove the entire board and c suite, and claw back everything they have made, then sue them into poverty.
This kind of breach is not necessarily reported to authorities under GDPR. Because you only report security incidents where there is an impact on data subjects (personal data is affected).What would be interesting to know is whether or not they reported this breach to authorities. GDPR requires it, I'm fairly certain, and the upcoming NIS2 directive absolutely does.
The article says that they had access to email accounts. You can get a lot of PII from that (eg: phone numbers or IM accounts in signatures), and a lot more if you have access to the contact list. I wonder if that would qualify as "impact on data subjects" or not, genuinely curious.This kind of breach is not necessarily reported to authorities under GDPR. Because you only report security incidents where there is an impact on data subjects (personal data is affected).
One situation where they have to report this is if the hackers accessed their employees personal data.
Another situation is if they act as a processor for some of their clients, and the personal data of their clients' clients was exposed. But in this case they would report to the controller.
I can absolutely expect and demand military contractors dealing with national security matters to be able to withstand such attacks. Then again, those types of companies should be getting assistance from their home government to resist those attacks.no company can be expected to withstand a targeted attack from a state-sponsored actor.
In my experience working these kinds of incidents internal/external counsel usually will conclude that unless it can be identified through logs or analysis of exfiltrated data specifically who and what data was accessed they typically will say its impossible to quantify and say that there was no identified access to PII.The article says that they had access to email accounts. You can get a lot of PII from that (eg: phone numbers or IM accounts in signatures), and a lot more if you have access to the contact list. I wonder if that would qualify as "impact on data subjects" or not, genuinely curious.
Article 29 WP says that ""This risk exists when the breach may lead to physical, material or non-material damage for the individuals whose data have been breached". So there has to be some direct impact.The article says that they had access to email accounts. You can get a lot of PII from that (eg: phone numbers or IM accounts in signatures), and a lot more if you have access to the contact list. I wonder if that would qualify as "impact on data subjects" or not, genuinely curious.
Sorry, no.The SDKs that can be downloaded by anyone who works with NXP chips by any chance?
If they had enough access to insert hardware backdoors in the designs that's one thing. If they downloaded the docs...
Source code? I don't want to see the source code for the NXP pin config tool even if they gave it to me. This is not a software company. Or they mean the kernel source code that's visible to anyone on github?
NCR is a fairly well-known American company, formerly called National Cash Register.I was wondering why I had never heard of NCR.
And calling it a news-outlet isn't technically wrong, but 'national newspaper' would have given readers a better idea of who they are.
My first thought with this was: how does this timeline track with Huawei's latest bump in capacity?There are times when I really really wish that Tom Clancy and other spy fiction had little bits of reality, in which the wretched scum who do stuff like this would end up with a 9MM migraine...
(note: i'm an ex-Nortel employee: a company that was massively damaged by Chinese gov't funded and targeted espionage. One can trace vast amounts of Huawei's growth directly to theft from Nortel )
It would have helped me if they had kept the full name of NRC Handelsblad when they talked about it as only the initials confused me as there are many other three lettter initial users of NRC.I was wondering why I had never heard of NCR.
And calling it a news-outlet isn't technically wrong, but 'national newspaper' would have given readers a better idea of who they are.
As stated in our 2019 Annual Report, we became aware of a compromise of certain IT systems, and after a thorough investigation we determined that this incident did not result in a material adverse effect on our business.
Blame the newspaper for that, they officially rebranded by dropping the 'Handelsblad', I think around the same time that they stopped being an evening newspaper. Sic transit gloria mundi.It would have helped me if they had kept the full name of NRC Handelsblad when they talked about it as only the initials confused me as there are many other three lettter initial users of NRC.
[A]fter a thorough investigation we determined that this incident did not result in a material adverse effect on our business.
Some security researchers said it was surprising that NXP officials didn’t inform customers of the two-year intrusion by threat actors, often abbreviated as TAs.
Disclosure laws are changing. I can't speak for the Netherlands or EU, but the SEC finalized a rule in September that will require publicly traded companies to file disclosures with the SEC within four days of incidents that have a "material" impact, meaning that many will be reported while they're cleaning up. This applies as of 15 Dec 2023 for most large businesses and as of 15 Jan 2024 for the rest. They will also have to make annual filings describing their cybersecurity strategy, a summary of all incidents handled during the prior fiscal year, and the amount of cybersecurity expertise (if any) within the board of directors. The materiality definition is still vague, but the SEC has been taking a rather negative view of playing with those rules of late, and companies have taken note.Why? What is it that makes the lack of disclosure surpising? There were no laws requiring timely or complete disclosure at the time (still aren't, as far as I'm aware). So long as they were careful to run their statements through legal to confirm they didn't actually lie, there was no upside to telling the whole truth--especially when the breach was going on for long enough to make their raison d'être seem almost iredeemably suspect.
It's the 21st century and companies designing multi-billion-transistors chips use code, rather than the old kit of discrete logic gates, superglue, and tiny tweezers. TMYK.Source code? I don't want to see the source code for the NXP pin config tool even if they gave it to me. This is not a software company. Or they mean the kernel source code that's visible to anyone on github?
China has pretty much all the plans for both the F-22 and F-35. If Lockheed can’t keep their systems secure, why would we expect anyone else can. (Not that Lockheed is necessarily such a great company, but then again, what company is?)I can absolutely expect and demand military contractors dealing with national security matters to be able to withstand such attacks. Then again, those types of companies should be getting assistance from their home government to resist those attacks.
IOW, I would be shocked if say, the security of Lockheed Martin's infra that is related to the F35 program isn't helped being overseen by the US DOD.
Did you watch Shawn Ryan's interview with YTCracker?There are times when I really really wish that Tom Clancy and other spy fiction had little bits of reality, in which the wretched scum who do stuff like this would end up with a 9MM migraine...
(note: i'm an ex-Nortel employee: a company that was massively damaged by Chinese gov't funded and targeted espionage. One can trace vast amounts of Huawei's growth directly to theft from Nortel )
The last company I worked for was responsible for doing supply chain analysis on the F-35. It's not being overseen by the DOD. This is America. They subcontract that out.I can absolutely expect and demand military contractors dealing with national security matters to be able to withstand such attacks. Then again, those types of companies should be getting assistance from their home government to resist those attacks.
IOW, I would be shocked if say, the security of Lockheed Martin's infra that is related to the F35 program isn't helped being overseen by the US DOD.