Sunday, April 13, 2025
HomeMalware"Super Malware" Steals Encryption Keys From Intel SGX Isolated Memory Fields

“Super Malware” Steals Encryption Keys From Intel SGX Isolated Memory Fields

Published on

SIEM as a Service

Follow Us on Google News

A scientist’s Team from Graz University of Technology revealed the method that leaking the  encryption data from Intel SGX (Software Guard Extensions ) enclaves which is called Isolated Memory FIeld .

Intel SGX is a set of new instructions from Intel that allows user-level code to allocate private regions of memory, called enclaves, that unlike normal process memory is also protected from processes running at higher privilege levels.

Security Research Team develop this”super Malware” under PoC (Proof of Concepts) and they Explained in their Research Paper , how this “Super Malware” leak the data from Isolated memory field by cache attack .

- Advertisement - Google News

Also explained about the Attack Vector ,

Our proof-of-concept malware is able to recover RSA keys by monitoring cache access patterns of an RSA signature process in a semi-synchronous attack,” researchers said.In a semi-synchronous attack, we extract 96% of an RSA private key from a single trace,” they said. “We extract the full RSA private key in an automated attack from 11 traces within 5 minutes.

Researcher Explained in their Research Paper,  “we show that it is very well possible for enclave malware to attack its hosting system. We demonstrate a cache attack from within a malicious enclave that is ex-tracting secret keys from co-located enclaves.”

“Our proof-of-concept malware is able to recover RSA keys by monitoring cache access patterns of an RSA signature process in a semi-module.”

This protects enclaves against hardware attacks trying to read or manipulate enclave content in DRAM.Creation and loading of enclaves are done by the oper-ating system.

“Super Malware” hide from anti-virus scanners

Researchers said ,To protect the integrity of enclave code, the loading procedure is measured by the CPU.

“If the resulting measurement does not match the value specified by the enclave developer, the CPU will refuse to run the enclave.”

During enclave loading, the operating system has full access to the enclave binary.

“At this point anti-virus scanners can hook in to analyze the enclave binary before it is executed. Enclave malware will attempt to hide from anti-virus scanners by encrypting malicious payload.”

For More About : Super Malware

 Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against...