Skip to main content

New Spectre attack lets hackers steal data without having to run local code on PCs

A recent white paper released by researchers at the Graz University of Technology in Austria reveals a new attack called NetSpectre. Unlike the internet-based Spectre attack that requires a hacker to run code locally on the target PC, this version can steal data from the target PC’s memory without running any local code.

The basic method of attack is nothing new. It’s based on how a CPU speculates where its current processing path will go. A chunk of its speed stems from how it can think ahead and test different routes (branches) to determine the quickest avenue to completion. While it’s testing these routes, the chip stores data in its local cache in an unprotected way.

Unfortunately, this is a problem that resides in all modern processors. In most cases, data can only be stolen if a hacker has physical access to the target PC to run malicious code. Hackers can also attack PCs remotely by running malicious JavaScript on their websites that you download as browser cache.

But with NetSpectre, there’s nothing to download. Instead, the attacker bombards the network ports of a target PC with malicious code. The good news is that this method takes an extremely long time to extract data from memory due to the noisy environment of the internet. For instance, one method directly targets the CPU’s cache at 15 bits per hour, while another method targets a specific module (AVX2) at 60 bits per hour.

Of course, hackers don’t want everything stored in memory: They want the juicy bits. In addition to the slow data leak, they must sift through the garbage to pull out valuable, privileged items. Finding an encryption key in the slow data flow could take days versus accessing the same key by running malicious code locally on the target PC.

According to the paper, the NetSpectre attack consists of two components. The first is a leak gadget that pulls one or multiple bytes of data from memory, although single-bit gadgets are “most versatile.” The second component is the transmit gadget that makes the CPU’s state visible over the network, so the hacker can retrieve the data.

Hackers carry out the attack in four stages. First, they send the leak gadget to “mis-train” the processor’s predictive capability and then reset the environment to enable the encoding of leaked bits. After that, hackers exploit the Spectre Variant 1 vulnerability to leak data and use the transmit gadget to deliver the goods.

“As the network latency varies, the four steps have to be repeated multiple times to eliminate the noise caused by these fluctuations,” the report states. “Typically, the variance in latency follows a certain distribution depending on multiple factors, such as distance, number of hops, network congestion.”

But don’t worry, because this isn’t a vulnerability that requires a new patch. According to Intel, it’s mitigated through the same techniques used to patch Meltdown and the two Spectre variants: code inspection and modification of software. That places a speculation stopping barrier where appropriate.

“We provide guidance for developers in our whitepaper, Analyzing Potential Bounds Check Bypass Vulnerabilities, which has been updated to incorporate this method,” Intel says. “We are thankful to Michael Schwarz, Daniel Gruss, Martin Schwarzl, Moritz Lipp, & Stefan Mangard of Graz University of Technology for reporting their research.”

Updated July 27, 2018 to reflect Intel’s response.

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
How to type an em dash in Windows
Overhead view of someone typing on a surface laptop.

The em dash is a supremely useful (and fashionable) piece of punctuation used in writing and editing, often in place of a comma, colon, or parenthesis. While you might want to utilize it to make your grammar look fancy, the symbol on a computer can be a little challenging to access if you don’t know how, especially on the Windows operating system.

Fortunately, there are several methods available to insert the em dash punctuation into your text. Check out the following tips to learn how to become more familiar with the em dash on your computer.
Keyboard
The em dash keyboard shortcut is one of the easier methods to access the punctuation. Though it might take a little bit of getting used to, once you master it ,you’ll be an em dash typing master. Turn on Number Lock by pressing the NumLock key on the upper number row of your keyboard. Then hold the Alt key and type the sequence 0151 on the numeric keypad of your keyboard. Release the Alt key and the em dash will appear.

Read more
8K VR comes to the Quest 3
A Meta Quest 3 sits on a wooden floor in moody backlighting.

The best place to watch 360-degree videos is in VR, and the Meta Quest 3 just got a big upgrade in quality that makes the experience even better after Google updated its YouTube VR app to support 8K resolution.

8K might sound excessive since even the best VR headsets, like the Apple Vision Pro and the recently announced Pimax Crystal Super, have resolutions closer to 4K-per-eye. However, you can only see a third or less of a 360-degree video at once.

Read more
AI is about to change video production forever
An object being highlighted in a scene from a video.

Generative AI is just starting to break into the world of video, but some new features in Premiere Pro are taking things to the next level. Adobe has announced a host of generative AI video tools that it will be introducing to the Premiere Pro video editing suite throughout the year, and they look pretty incredible.

The brand is working to expand on its own AI model, Adobe Firefly, which started as a text-to-image generator last March and has quickly expanded its AI brand across several editing mediums.

Read more