Threats News -  Úvod  Analýza  Risk  Trendy  Top  Predictions  Graf  Hacking  Top Attack  Infiltration  Communication 

Update 11.02.2019 18:44:04

 

Datum

Název

Obrázek

Popis

Categorie
13.11.19 TPM—Fail Image result for cpu attack" Trusted Platform Module (TPM) serves as a root of trust for the operating system. TPM is supposed to protect our security keys from malicious adversaries like malware and rootkits. Hardware

13.11.19

TSX Speculative Attack Image result for cpu attack" A new speculative vulnerability called ZombieLoad 2, or TSX Asynchronous Abort, has been disclosed today that targets the Transactional Synchronization Extensions (TSX) feature in Intel processors. Hardware

13.11.19

MDS Attack Image result for cpu attack" The RIDL and Fallout speculative execution attacks allow attackers to leak private data across arbitrary security boundaries on a victim system, for instance compromising data held in the cloud or leaking your data to malicious websites. Hardware

19.9.19

Simjacker Attack simjacker Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone users. SIM Attack
10.8.19 SWAPGS Attack Výsledek obrázku pro IT hardware The SWAPGS Attack, as they call it, circumvents the protective measures that have been put in-place in response to earlier attacks such as Spectre and Meltdown. Still, there is plenty of good news: Microsoft has already released Windows patches for the flaw that makes the attack possible and, even though feasible, the researchers don’t expect the attack to be exploited for widespread, non-targeted attacks. Hardware
10.3.19 Thunderclap Výsledek obrázku pro IT hardware Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have complete access to the state of a computer and can fully compromise it including reading and writing all of system memory. With the popularity of Thunderbolt 3 over USB Type-C and smart internal devices, opportunities for these attacks to be performed casually with only seconds of physical access to a computer have greatly broadened. Hardware

27.9.2018

LOJAX First UEFI rootkit

Výsledek obrázku pro rootkit

UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks, as they are hard to detect and able to survive security measures such as operating system reinstallation and even a hard disk replacement.

Hardware

21.8.2018

Man-in-the-Disk

Výsledek obrázku pro android logo

Recently, our researchers came across a shortcoming in the design of Android’s use of storage resources. Careless use of External Storage by applications may open the door to an attack resulting in any number of undesired outcomes, such as silent installation of unrequested, potentially malicious, apps to the user’s phone, denial of service for legitimate apps, and even cause applications to crash, opening the door to possible code injection that would then run in the privileged context of the attacked application.

Hardware

21.8.2018

Faxploit

Fax, the brilliant technology that lifted mankind out the dark ages of mail delivery when only the postal service and carrier pigeons were used to deliver a physical message from a sender to a receiver. Technology wise, however, that was a long time ago. Today we are light years away from those dark days. In its place we have email, chat messengers, mobile communication channels, web-services, satellites using quantum messaging and more.

Hardware

15.8.2018

TLBLEED

Výsledek obrázku pro TLBLEED

TLBleed is a new side channel attack that has been proven to work on Intel CPU’s with Hyperthreading (generally Simultaneous Multi-threading, or  SMT, or HT on Intel) enabled. It relies on concurrent access to the TLB, and it being shared between threads. We find that the L1dtlb and the STLB (L2 TLB) is shared between threads on Intel CPU cores.

Hardware

22.10.2018

Foreshadow v7

Výsledek obrázku pro TLBLEED

CVE 2018-3620

Hardware

22.10.2018

Foreshadow v6

Výsledek obrázku pro TLBLEED

CVE 2018-3646

Hardware

15.8.2018

Foreshadow v5
L1 Terminal Fault (L1TF)

Foreshadow is a vulnerability that affects modern microprocessors that was first discovered by two independent teams of researchers in January 2018, but was first disclosed to the public on 14 August 2018.The vulnerability is a speculative execution attack on Intel processors that may result in the loss of sensitive information stored in personal computers, or third party clouds.There are two versions: the first version (original/Foreshadow) (CVE-2018-3615) targets data from SGX enclaves; and the second version (next-generation/Foreshadow-NG) (CVE-2018-3620 and CVE-2018-3646) targets Virtual Machines (VMs), hypervisors (VMM), operating system (OS) kernel memory, and System Management Mode (SMM) memory

Hardware

15.8.2018

Meltdown v3
Rogue Data Cache Load (RDCL)

Meltdown is a hardware vulnerability affecting Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors. It allows a rogue process to read all memory, even when it is not authorized to do so.

Hardware

22.10.2018

Spectre-NG

2018-3665 Lazy FP State Restore

Hardware

22.10.2018

Spectre-NG

2018-3693 Bounds Check Bypass Store (BCBS)

Hardware

22.10.2018

Spectre-NG v4
Speculative Store Bypass (SSB)

Speculative Store Bypass (SSB)

Hardware

22.10.2018

Spectre-NG v3a
Rogue System Register Read (RSRE)

On May 21, 2018, Intel published information on the first two Spectre-NG class side-channel vulnerabilities CVE-2018-3640 (Rogue System Register Read, Variant 3a) and CVE-2018-3639 (Speculative Store Bypass, Variant 4), also referred to as Intel SA-00115 and HP PSR-2018-0074, respectively.

Hardware

22.10.2018

Spectre v2
Branch Target Injection (BTI)

On March 15, 2018, Intel reported that it will redesign its CPUs (performance losses to be determined) to help protect against the Spectre and related Meltdown vulnerabilities (especially, Spectre variant 2 and Meltdown, but not Spectre variant 1), and expects to release the newly redesigned processors later in 2018.On October 8, 2018, Intel is reported to have added hardware and firmware mitigations regarding Spectre and Meltdown vulnerabilities to its latest processors. On October 18, 2018, MIT researchers suggested a new mitigation approach, called DAWG (Dynamically Allocated Way Guard), which may promise better security without compromising performance

Hardware

15.8.2018

Spectre v1
Branch Target Injection (BTI)

Spectre is a vulnerability that affects modern microprocessors that perform branch prediction.On most processors, the speculative execution resulting from a branch misprediction may leave observable side effects that may reveal private data to attackers. For example, if the pattern of memory accesses performed by such speculative execution depends on private data, the resulting state of the data cache constitutes a side channel through which an attacker may be able to extract information about the private data using a timing attack.

Hardware