Originally Posted by PandaBear
Personal tie? No, but have done enough contract manufacturing related work that I know changes like this should not have been "caught off guard". PCB changes are usually big enough that you will not be able to fool people, because you have to change the test and the result interpretation, and the yield, and all sorts of other stuff. The design already has the pads in place to insert these chips, that's for sure, otherwise you can't fool people and change their designs. The customers probably asked them to not populate a few chips they only use for design / debugging in mass production, and then the manufacturers have some left and they just put them in anyways (to reduce variations or make manufacturing easier, i.e. more test to improve yield) at no charge. You see that a lot if you get penalized for yield loss (i.e. typically 98.5% when mature, 90% when launch). Throwing in a free chip is cheaper than a lost.
Originally Posted by PandaBear
I've also done security audit and know that you will ALWAYS find something, big or small, and you'll never catch everything.

Originally Posted by PandaBear
I'm more interested in why it isn't mentioned which chip they are talking about. My bet is a debug access chip on SMBus or UART, something useful for debugging, maybe even just the phy to the chip or a resistor to enable / disable the existing debug features. I have seen contract manufacturers throw in a few popcorns for free so they don't have 2^6 kind of configurations they have to keep inventories on, and get sloppy and didn't document these stuff.
Originally Posted by Bloomberg
A Chinese military unit designed and manufactured microchips as small as a sharpened pencil tip. Some of the chips were built to look like signal conditioning couplers, and they incorporated memory, networking capability, and sufficient processing power for an attack.
Originally Posted by Bloomberg
Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally.
Originally Posted by Bloomberg
two people familiar with the chips' operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board's temporary memory en route to the server's central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.
Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device's operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.
Quote
https://www.kgw.com/article/money/a...l-technologies-server-hack/283-600850935
Is it really a hack? Or just propaganda? My money is betting that Dell and HP are trying to smear Super Micro so they don't lose more customer to the cheaper sources. Let's be serious here. How are they going to access the server when it is in a data center, guarded by all sorts of security check on the network? Even if you open it all up you won't be able to access it without being seen.