Monday, November 25, 2024
HomeMalware"Super Malware" Steals Encryption Keys From Intel SGX Isolated Memory Fields

“Super Malware” Steals Encryption Keys From Intel SGX Isolated Memory Fields

Published on

A scientist’s Team from Graz University of Technology revealed the method that leaking theĀ  encryption data from Intel SGX (Software Guard Extensions ) enclaves which is called Isolated Memory FIeld .

Intel SGX is a set of new instructions from Intel that allows user-level code to allocate private regions of memory, called enclaves, that unlike normal process memory is also protected from processes running at higher privilege levels.

Security Research Team develop this”super Malware” under PoC (Proof of Concepts) and they Explained in their Research Paper , how this “Super Malware” leak the data from Isolated memory field by cache attack .

- Advertisement - SIEM as a Service

Also explained about the Attack Vector ,

Our proof-of-concept malware is able to recover RSA keys by monitoring cache access patterns of an RSA signature process in a semi-synchronous attack,” researchers said.In a semi-synchronous attack, we extract 96% of an RSA private key from a single trace,” they said. “We extract the full RSA private key in an automated attack from 11 traces within 5 minutes.

Researcher Explained in their Research Paper,Ā  “we show that it is very well possible for enclave malware to attack its hosting system. We demonstrate a cache attack from within a malicious enclave that is ex-tracting secret keys from co-located enclaves.”

“Our proof-of-concept malware is able to recover RSA keys by monitoring cache access patterns of an RSA signature process in a semi-module.”

This protects enclaves against hardware attacks trying to read or manipulate enclave content in DRAM.Creation and loading of enclaves are done by the oper-ating system.

“Super Malware” hide from anti-virus scanners

Researchers said ,To protect the integrity of enclave code, the loading procedure is measured by the CPU.

“If the resulting measurement does not match the value specified by the enclave developer, the CPU will refuse to run the enclave.”

During enclave loading, the operating system has full access to the enclave binary.

“At this point anti-virus scanners can hook in to analyze the enclave binary before it is executed. Enclave malware will attempt to hide from anti-virus scanners by encrypting malicious payload.”

For More About : Super Malware

 Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoftā€™s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

Ā Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...