Skip to main content

Researchers discover your PC’s RAM is even easier to hack than thought

dram
Image used with permission by copyright holder
Security researchers have found new methodology that could make Rowhammer attacks easier for hackers to execute. New ways of triggering the process seem to be much quicker and more reliable than previous routines, which could lead to an increase in the use of this burgeoning exploit.

Rowhammer works by taking advantage of a physical weakness in dynamic random-access memory, or DRAM, which can cause memory cells to leak their charges and affect the content of nearby rows. Known among researchers as “bitflipping,” it’s an unintentional side effect of recent efforts to make memory more compact. It wasn’t long, however, before ways of prompting the process on purpose were discovered.

Previous research uncovered methods that were unreliable or prohibitively difficult. One process used Javascript for a successful result, but that approach was limited to certain platforms, was slow to complete its work, and required the targeted user to have made certain tweaks to the default settings on their system.

Now, a new report suggests that code already present on the target system that contains non-temporal instructions could be used to facilitate bitflipping, according to a report from Ars Technica. Because non-temporal instructions store data on a DRAM chip rather than the cache, they provide a much more direct route to the target.

Potentially, a malicious Web app could exploit non-temporal instructions to remove the security constraints being put in place by a Web browser. Alternatively, malicious files fed into a video player or another app could seize upon instructions used by the software to make an attack on the system’s DRAM.

This method demonstrates the continued importance of security work — it’s thought that Rowhammer might be a couple of years away from being practical, which gives developers some time to combat its effects. However, the fact that these attacks utilize a physical trait of DRAM memory might make them rather difficult to counteract.

Editors' Recommendations

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
U.S. federal court system cyberattack is worse than previously thought
A large monitor displaying a security hacking breach warning.

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an “incredibly significant and sophisticated” attack.

This statement is a stark difference from the one initially provided when the situation occurred in 2020.

Read more
This PC case probably costs more than your entire computer
The Regner PC case that comes with two cooling radiators.

With the enthusiast PC segment growing at an exponential rate, the innovation in PC cases that house all these components required by users for their build has aggressively progressed as well in recent years.

The latest case that perfectly illustrates this trend is the Regner PC chassis -- a product that sports two whole cooling radiators within the side panels, and it's not cheap.

Read more
Not even your PC’s power supply is safe from hackers
Eaton 5S1500LCD UPS Battery Backup.

Hackers have managed to find a way to successfully gain access to uninterruptable power supply (UPS) computer systems, according to a report from The Cybersecurity and Infrastructure Security Agency (CISA).

As reported by Bleeping Computer and Tom’s Hardware, both the Department of Energy and CISA issued a warning to organizations based in the U.S. that malicious threat actors have started to focus on infiltrating UPS devices, which are used by data centers, server rooms, and hospitals.

Read more