Friday, February 21, 2025
HomeVulnerabilityNetSpectre - New Spectre Remote Attack over Network Affected Billions of...

NetSpectre – New Spectre Remote Attack over Network Affected Billions of Devices

Published on

SIEM as a Service

Follow Us on Google News

Group of Security researchers discovered new Spectre remote attack called NetSpectre over a network connection that affected nearly billion of devices around the world.

Previously discovered highly critical vulnerabilities Spectre and Meltdown have been made a huge impact on IT sectors and the attack works on mobile devices, personal computers, and cloud infrastructure depends on the cloud providers.

Other Spectre level attacks are required local user interaction and the attacker needs to Trick victims to download some malicious file and execute into their system.

Earlier of this month, Intel rewarded $100,000 for two security researchers to find the CPU Spectre level critical vulnerability which leads to leak confidential information through microarchitectural side channels.

But this remote NetSpectre attack shift from local attacks, to remote attacks, exposing a much wider range and a larger number of devices.

It’s believed that all processors, including Intel, AMD, and ARM chips, vulnerable to Spectre variant 1 are also vulnerable to NetSpectre.

Also, these NetSpectre attacks work in local-area networks as well as between virtual machines in the Google cloud.

NetSpectre leaks sensitive data, such as encryption keys or passwords, using the NetSpectre attack in a cloud environment.

Also, Researchers demonstrate that especially in this remote scenario, attacks based on weaker gadgets which do not leak actual data, are still very powerful to break address-space layout randomization remotely.

Like a nearby Spectre Attack, new remote Attack requires the nearness of a Spectre contraption in the code of the objective.

This generic remote Spectre attack, allowing to read arbitrary memory over the network which contains the required Spectre gadgets in an exposed network interface.

According to the Researchers,  We show that memory access latency, in general, can be reflected in the latency of network requests. Hence, we demonstrate that it is possible for an attacker to distinguish cache hits and misses on specific cache lines remotely, by measuring and averaging over a larger number of measurements

Establishing a network connection to a service running exploitable snippets of code should, in theory, be enough to very slowly discern the contents of application memory remotely.

According to Michael Schwartz, “We show that Spectre attacks do not require local code execution but can also be mounted remotely,” Moreover, with the new covert channel, we show that Spectre does not necessarily require the cache to leak values.”

This requires precise timing and constant measurement, so noisy network environments, such as the internet, will hamper exploitation to some extent.

The paper, written by Michael Schwarz, Daniel Gruss, Martin Schwarzl, Moritz Lipp, and Stefan Mangard of the Austria’s Graz University of Technology and name as “NetSpectre: Read Arbitrary Memory over Network”.

The specialists announced the NetSpectre attack technique to Intel, which asserts that issue has just been alleviated in the firmware refreshes the chip creator made accessible for the CVE-2017-5753 Specter variation Attack.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...