The US Cyber Officials Were Not Informed By Intel About Chip Faults Until Made Public

The US Cyber Officials Were Not Informed By Intel About Chip Faults Until Made Public

The US cyber security officials were not notified by Intel Corp about the alleged Spectre and Meltdown chip security faults until they disclosed to the people, 6 Months after the chip maker was informed of the issues by Alphabet, as per letters conveyed to lawmakers by the tech firms.

The US Cyber Officials Were Not Informed By Intel About Chip Faults Until Made Public

Previous and existing US government officials have put forward apprehensions that the administration was not notified of the faults prior to they became public as the faults potentially apprehended national security repercussions. Intel mentioned it did not feel the faults required to be conveyed to the US regulatory as attackers had not exploited the susceptibilities.

Until January 3, the United States Computer Emergency Readiness Team, commonly recognized as US-CERT, was not informed by Intel about the Spectre and Meltdown, after reports pertaining to it surfaced on The Register, an online technology site. The US-CERT issues forewarnings to the private and public sector about the cyber-security issues.

The letters conveyed by Apple, Alphabet, and Intel in response to the query by Representative Greg Walden—head of the House Energy and Commerce Committee—detailed the particulars of when the flaws were revealed. Alphabet mentioned that its Google Project Zero’s security researchers notified the chipmakers Advanced Micro Devices, Intel, and SoftBank Group-possessed ARM Holdings of the issue in June.

The chipmaker was given 90 Days to rectify the problems prior to revealing them publicly, which is a standard protocol followed in the cybersecurity industry. It is proposed to offer time to the bug targets to mend them before the attackers can take benefit of the faults. Alphabet stated it left the choice of whether to notify the government officials of the safety faults up to the chipmakers—as per their standard protocol.

As per its letter, Intel mentioned it did not notify the government officials as there was “no sign that any of these susceptibilities had been used by malicious actors.” It also stated it did not conduct an examination of whether the faults may damage critical infrastructure as it didn’t consider it could have an effect on industrial control systems. However, it mentioned that it did notify other tech firms that utilize its chips of the problem.

Also, ARM, AMD,, and Microsoft Corp also replied to the queries from lawmakers. AMD stated that the disclose deadline was extended by Alphabet extended from the set 90 Days two times, initially to January 3, and later to January 9. Microsoft stated that it did tell numerous antivirus software makers regarding the faults “several weeks” prior to their public revelation to offer them time to shun compatibility issues.

Categorised as News

By Megan Lancaster

Megan Lancaster is a seasoned journalist with over 20 years experience as a columnist and beat reporter. While studying journalism at Ryerson University In Toronto, Megan wrote her thesis on media influence on local politics. As a contributor to Cambridge Daily Mirror, Megan mostly covers politics.

Leave a comment

Your email address will not be published. Required fields are marked *