Skip to main content

Researchers discover your PC’s RAM is even easier to hack than thought

dram
Image used with permission by copyright holder
Security researchers have found new methodology that could make Rowhammer attacks easier for hackers to execute. New ways of triggering the process seem to be much quicker and more reliable than previous routines, which could lead to an increase in the use of this burgeoning exploit.

Rowhammer works by taking advantage of a physical weakness in dynamic random-access memory, or DRAM, which can cause memory cells to leak their charges and affect the content of nearby rows. Known among researchers as “bitflipping,” it’s an unintentional side effect of recent efforts to make memory more compact. It wasn’t long, however, before ways of prompting the process on purpose were discovered.

Previous research uncovered methods that were unreliable or prohibitively difficult. One process used Javascript for a successful result, but that approach was limited to certain platforms, was slow to complete its work, and required the targeted user to have made certain tweaks to the default settings on their system.

Now, a new report suggests that code already present on the target system that contains non-temporal instructions could be used to facilitate bitflipping, according to a report from Ars Technica. Because non-temporal instructions store data on a DRAM chip rather than the cache, they provide a much more direct route to the target.

Potentially, a malicious Web app could exploit non-temporal instructions to remove the security constraints being put in place by a Web browser. Alternatively, malicious files fed into a video player or another app could seize upon instructions used by the software to make an attack on the system’s DRAM.

This method demonstrates the continued importance of security work — it’s thought that Rowhammer might be a couple of years away from being practical, which gives developers some time to combat its effects. However, the fact that these attacks utilize a physical trait of DRAM memory might make them rather difficult to counteract.

Editors' Recommendations

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
Hacking-as-a-service lets hackers steal your data for just $10
A depiction of a hacker breaking into a system via the use of code.

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage and perform their cyber crimes has been discovered -- and it’s gaining traction.

As reported by Bleeping Computer, security researchers unearthed a program called Dark Utilities, effectively providing a command and control (C2) center.

Read more
U.S. federal court system cyberattack is worse than previously thought
A large monitor displaying a security hacking breach warning.

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an “incredibly significant and sophisticated” attack.

This statement is a stark difference from the one initially provided when the situation occurred in 2020.

Read more
This PC case probably costs more than your entire computer
The Regner PC case that comes with two cooling radiators.

With the enthusiast PC segment growing at an exponential rate, the innovation in PC cases that house all these components required by users for their build has aggressively progressed as well in recent years.

The latest case that perfectly illustrates this trend is the Regner PC chassis -- a product that sports two whole cooling radiators within the side panels, and it's not cheap.

Read more