Monday, November 25, 2024
HomeComputer SecurityNetCAT - New Attack Allow Hackers to Spy & Steal the Data...

NetCAT – New Attack Allow Hackers to Spy & Steal the Data From Intel CPU Remotely

Published on

A new flaw named as NetCAT affects the Intel CPU’s that allows attackers to steal sensitive data from untrusted clients over the network.

NetCAT (Netowork Cache Attack) named by researchers considering the attack triggered in network-based cache side-channel that can leak sensitive data such as keystrokes in an SSH session from remote servers without any physical access.

This vulnerability that mainly resides in the new Intel feature called DDIO, a Data-Direct I/O (DDIO) is a performance-enhancing technology on recent Intel server-grade processors.

- Advertisement - SIEM as a Service

Due to the existence of the flaw in DDIO, it grants access for network devices and other peripherals to the CPU cache allows attackers to perform remote side-channel attacks by an untrusted local network.

DDIO has intended to add with Intel server-grade processors to improve the performance and fast cache while performing read/write operation in memory.

“In traditional architectures, where the network card uses direct memory access (DMA) to talk to the operating system, the memory latency alone quickly becomes the bottleneck on fast (e.g., 10Gb/s) networks. To alleviate the bottleneck, Intel introduced DDIO, an architecture where peripherals can operate direct cache access on the CPU’s (last-level) cache.”

NetCAT Attack

An attacker who will successfully perform the NetCAT attack can break the confidentiality of an SSH session remotely without deploying any malicious software on the remote server.

Also, the machine that controlled by the attacker can solely perform this attack by sending network packets to the remote server.

Researchers from vusec successfully tested the NetCAT attack by leak the arrival time of the individual network packets from an SSH session using remote cache side-channel.

In other words, NetCAT Attack leaks the timing of the event (press a key) by leaking the arrival time of the corresponding network packet when the victims type a character inside an encrypted SSH session on your console.

According to VUSec , “we exploit the fact that the DDIO-enabled application server has a shared resource (the last-level cache) between the CPU cores and the network card. We reverse engineered important properties of DDIO to understand how the cache is shared with DDIO. We then use this knowledge to leak sensitive information from the cache of the application server using a cache side-channel attack over the network.”

NetCAT attack can be performed similar to the Throwhammer, and the researchers used the Remote Direct Memory Access (RDMA), a technology that allows their exploit to control the target server memory location of the network packets.

NetCAT Attack

Successful NetCAT attack allows attacker can spy on remote server-side peripherals such as network cards to leak victim data over the network.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Hijacked Misconfigured Servers For Live Streaming Sports

Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized...

Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023 

Exploring the world of cryptocurrencies has been a thrilling journey for me. The allure...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...