NetCAT – New Attack Allow Hackers to Spy & Steal the Data From Intel CPU Remotely

A new flaw named as NetCAT affects the Intel CPU’s that allows attackers to steal sensitive data from untrusted clients over the network.

NetCAT (Netowork Cache Attack) named by researchers considering the attack triggered in network-based cache side-channel that can leak sensitive data such as keystrokes in an SSH session from remote servers without any physical access.

This vulnerability that mainly resides in the new Intel feature called DDIO, a Data-Direct I/O (DDIO) is a performance-enhancing technology on recent Intel server-grade processors.

Due to the existence of the flaw in DDIO, it grants access for network devices and other peripherals to the CPU cache allows attackers to perform remote side-channel attacks by an untrusted local network.

DDIO has intended to add with Intel server-grade processors to improve the performance and fast cache while performing read/write operation in memory.

“In traditional architectures, where the network card uses direct memory access (DMA) to talk to the operating system, the memory latency alone quickly becomes the bottleneck on fast (e.g., 10Gb/s) networks. To alleviate the bottleneck, Intel introduced DDIO, an architecture where peripherals can operate direct cache access on the CPU’s (last-level) cache.”

NetCAT Attack

An attacker who will successfully perform the NetCAT attack can break the confidentiality of an SSH session remotely without deploying any malicious software on the remote server.

Also, the machine that controlled by the attacker can solely perform this attack by sending network packets to the remote server.

Researchers from vusec successfully tested the NetCAT attack by leak the arrival time of the individual network packets from an SSH session using remote cache side-channel.

In other words, NetCAT Attack leaks the timing of the event (press a key) by leaking the arrival time of the corresponding network packet when the victims type a character inside an encrypted SSH session on your console.

According to VUSec , “we exploit the fact that the DDIO-enabled application server has a shared resource (the last-level cache) between the CPU cores and the network card. We reverse engineered important properties of DDIO to understand how the cache is shared with DDIO. We then use this knowledge to leak sensitive information from the cache of the application server using a cache side-channel attack over the network.”

NetCAT attack can be performed similar to the Throwhammer, and the researchers used the Remote Direct Memory Access (RDMA), a technology that allows their exploit to control the target server memory location of the network packets.

Successful NetCAT attack allows attacker can spy on remote server-side peripherals such as network cards to leak victim data over the network.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

8 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

8 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

11 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

14 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

15 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

15 hours ago