![Page Background](./../common/page-substrates/page0059.jpg)
52
I
n
2015,
Amazon.comInc. began quietly evaluating a startup
called Elemental Technologies, a potential acquisition to
help with a major expansion of its streaming video service,
known today as Amazon Prime Video. Based in Portland, Ore.,
Elemental made software for compressing massive video
iles
and formatting them for diferent devices. Its technology had
helped stream the Olympic Games online, communicate with
the International Space Station, and funnel drone footage to
the Central Intelligence Agency. Elemental’s national security
contracts weren’t the main reason for the proposed acquisi-
tion, but they it nicely with Amazon’s government businesses,
such as the highly secure cloud that Amazon Web Services
(AWS) was building for the CIA.
To help with due diligence, AWS, which was overseeing the
prospective acquisition, hired a third-party company to scru-
tinize Elemental’s security, according to one person familiar
with the process. The irst pass uncovered troubling issues,
prompting AWS to take a closer look at Elemental’s main prod-
uct: the expensive servers that customers installed in their net-
works to handle the video compression. These servers were
assembled for Elemental by Super Micro Computer Inc., a San
Jose-based company (commonly known as Supermicro) that’s
also one of the world’s biggest suppliers of server mother-
boards, the iberglass-mounted clusters of chips and capaci-
tors that act as the neurons of data centers large and small. In
late spring of
2015, Elemental’s st
af boxed up several servers
and sent them to Ontario, Canada, for the third-party security
company to test, the person says.
Nested on the servers’ motherboards, the testers found
a tiny microchip, not much bigger than a grain of rice, that
wasn’t part of the boards’ original design. Amazon reported
the discovery to U.S. authorities, sending a shudder through
the intelligence community. Elemental’s servers could be
found in Department of Defense data centers, the CIA’s drone
operations, and the onboard networks of Navy warships. And
Elemental was just one of hundreds of Supermicro customers.
During the ensuing top-secret probe, which remains open
more than three years later, investigators determined that the
chips allowed the attackers to create a stealth doorway into any
network that included the altered machines. Multiple people
familiar with the matter say investigators found that the chips
had been inserted at factories run by manufacturing subcon-
tractors in China.
This attack was something graver than the software-based
incidents the world has grown accustomed to seeing.
Hardware hacks are more diicult to pull of and potentially
more devastating, promising the kind of long-term, stealth
access that spy agencies are willing to invest millions of dol-
lars and many years to get.
There are two ways for spies to alter the guts of computer
equipment. One, known as interdiction, consists of manip-
ulating devices as they’re in transit from manufacturer to
customer. This approach is favored by U.S. spy agencies,
according to documents leaked by former National Security
Agency contractor Edward Snowden. The other method
involves seeding changes from the very beginning.
One country in particular has an advantage executing this
kind of attack: China, which by some estimates makes 75 per-
cent of the world’s mobile phones and 90 percent of its PCs.
Still, to actually accomplish a seeding attack would mean devel-
oping a deep understanding of a product’s design, manipulat-
ing components at the factory, and ensuring that the doctored
devices made it through the global logistics chain to the desired
location—a feat akin to throwing a stick in the Yangtze River
upstream from Shanghai and ensuring that it washes ashore
in Seattle. “Having a well-done, nation-state-level hardware
implant surface would be like witnessing a unicorn jumping
over a rainbow,” says Joe Grand, a hardware hacker and the
founder of Grand Idea Studio Inc. “Hardware is just so far of
the radar, it’s almost treated like black magic.”
But that’s just what U.S. investigators found: The chips had
been inserted during the manufacturing process, two oicials
say, by operatives from a unit of the People’s Liberation Army.
In Supermicro, China’s spies appear to have found a perfect
conduit for what U.S. oicials now describe as the most sig-
niicant supply chain attack known to have been carried out
against American companies.
One oicial says investigators found that it eventually
affected almost 30 companies, including a major bank,
government contractors, and the world’s most valuable
Bloomberg Businessweek
October 8, 2018
The Big Hack
An investig tive report
By Jordan Robertson
and Michael Riley
Photographs by Victor Prado
Illustrations by Scott Gelber