NetCAT – New Attack Allow Hackers to Spy & Steal the Data From Intel CPU Remotely

A new flaw named as NetCAT affects the Intel CPU’s that allows attackers to steal sensitive data from untrusted clients over the network.

NetCAT (Netowork Cache Attack) named by researchers considering the attack triggered in network-based cache side-channel that can leak sensitive data such as keystrokes in an SSH session from remote servers without any physical access.

This vulnerability that mainly resides in the new Intel feature called DDIO, a Data-Direct I/O (DDIO) is a performance-enhancing technology on recent Intel server-grade processors.

Due to the existence of the flaw in DDIO, it grants access for network devices and other peripherals to the CPU cache allows attackers to perform remote side-channel attacks by an untrusted local network.

DDIO has intended to add with Intel server-grade processors to improve the performance and fast cache while performing read/write operation in memory.

“In traditional architectures, where the network card uses direct memory access (DMA) to talk to the operating system, the memory latency alone quickly becomes the bottleneck on fast (e.g., 10Gb/s) networks. To alleviate the bottleneck, Intel introduced DDIO, an architecture where peripherals can operate direct cache access on the CPU’s (last-level) cache.”

NetCAT Attack

An attacker who will successfully perform the NetCAT attack can break the confidentiality of an SSH session remotely without deploying any malicious software on the remote server.

Also, the machine that controlled by the attacker can solely perform this attack by sending network packets to the remote server.

Researchers from vusec successfully tested the NetCAT attack by leak the arrival time of the individual network packets from an SSH session using remote cache side-channel.

In other words, NetCAT Attack leaks the timing of the event (press a key) by leaking the arrival time of the corresponding network packet when the victims type a character inside an encrypted SSH session on your console.

According to VUSec , “we exploit the fact that the DDIO-enabled application server has a shared resource (the last-level cache) between the CPU cores and the network card. We reverse engineered important properties of DDIO to understand how the cache is shared with DDIO. We then use this knowledge to leak sensitive information from the cache of the application server using a cache side-channel attack over the network.”

NetCAT attack can be performed similar to the Throwhammer, and the researchers used the Remote Direct Memory Access (RDMA), a technology that allows their exploit to control the target server memory location of the network packets.

Successful NetCAT attack allows attacker can spy on remote server-side peripherals such as network cards to leak victim data over the network.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

42 minutes ago

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to…

45 minutes ago

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following…

47 minutes ago

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications,…

53 minutes ago

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip…

56 minutes ago

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements…

5 hours ago