Saturday, June 15, 2024

NetCAT – New Attack Allow Hackers to Spy & Steal the Data From Intel CPU Remotely

A new flaw named as NetCAT affects the Intel CPU’s that allows attackers to steal sensitive data from untrusted clients over the network.

NetCAT (Netowork Cache Attack) named by researchers considering the attack triggered in network-based cache side-channel that can leak sensitive data such as keystrokes in an SSH session from remote servers without any physical access.

This vulnerability that mainly resides in the new Intel feature called DDIO, a Data-Direct I/O (DDIO) is a performance-enhancing technology on recent Intel server-grade processors.

Due to the existence of the flaw in DDIO, it grants access for network devices and other peripherals to the CPU cache allows attackers to perform remote side-channel attacks by an untrusted local network.

DDIO has intended to add with Intel server-grade processors to improve the performance and fast cache while performing read/write operation in memory.

“In traditional architectures, where the network card uses direct memory access (DMA) to talk to the operating system, the memory latency alone quickly becomes the bottleneck on fast (e.g., 10Gb/s) networks. To alleviate the bottleneck, Intel introduced DDIO, an architecture where peripherals can operate direct cache access on the CPU’s (last-level) cache.”

NetCAT Attack

An attacker who will successfully perform the NetCAT attack can break the confidentiality of an SSH session remotely without deploying any malicious software on the remote server.

Also, the machine that controlled by the attacker can solely perform this attack by sending network packets to the remote server.

Researchers from vusec successfully tested the NetCAT attack by leak the arrival time of the individual network packets from an SSH session using remote cache side-channel.

In other words, NetCAT Attack leaks the timing of the event (press a key) by leaking the arrival time of the corresponding network packet when the victims type a character inside an encrypted SSH session on your console.

According to VUSec , “we exploit the fact that the DDIO-enabled application server has a shared resource (the last-level cache) between the CPU cores and the network card. We reverse engineered important properties of DDIO to understand how the cache is shared with DDIO. We then use this knowledge to leak sensitive information from the cache of the application server using a cache side-channel attack over the network.”

NetCAT attack can be performed similar to the Throwhammer, and the researchers used the Remote Direct Memory Access (RDMA), a technology that allows their exploit to control the target server memory location of the network packets.

NetCAT Attack

Successful NetCAT attack allows attacker can spy on remote server-side peripherals such as network cards to leak victim data over the network.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles