has been reported earlier that after a major hack, Intel Alder Lake's source code (including information such as BIOS and related chipsets) leaked, and the capacity of compressed files reached 2.8GB (full document 5.86GB), and it is not clear whether these data and files come from Intel or its partner.

Intel has sent a statement to TomsHardware, confirming the incident:
"Our proprietary UEFI code appears to have been leaked by a third party. We do not think this will expose any new security vulnerabilities, as our security measures do not rely on obfuscating information. This code is included in the "Project Circuit Breaker" vulnerability reward program, and we encourage any researchers who may find potential vulnerabilities to participate in the program. We are contacting customers and the security research community to let them know about this."
computers are used for hardware initialization before loading the operating system, including connections to certain security mechanisms, such as TPM, among its numerous responsibilities. Since the relevant code has been made public and has been officially recognized by Intel, some criminals and security researchers will try to find potential backdoors and security vulnerabilities, and they still need to be vigilant about this unpredictable security risk.
Intel did not confirm who leaked the code, nor did it confirm where or how it leaked, nor did it seem to show any sign of ransomware. Since some files mentioned the "functional tag test information" of Lenovo and a large number of files marked "Insyde", this may have some connection with Lenovo and Insyde Software, a company that provides firmware to OEM manufacturers and has cooperation with Lenovo.