1 min read

Researchers Find New CPU Security Vulnerability

Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent shockwaves through the entire world.

Well, it’s back. In a way.

While this new side-channel attack isn’t identical, it’s similar enough that the researchers who discovered it gave it a similar sounding name:  Hertzbleed.  It allows remote attackers to pilfer full cryptographic keys by observing variations in CPU frequency enabled by dynamic voltage and frequency scaling, or DVFS for short.

In other words, hackers can monitor the electrical output of your PC and based on that, derive your cryptographic keys.

A team from the University of Texas at Austin, in collaboration with others from the University of Washington and the University of Illinois Urbana-Champaign are credited with the discovery of the new attack vector.

The team had this to say about their discovery:

“In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure. [..] Hertzbleed is a real, and practical, threat to the security of cryptographic software.

First, Hertzbleed shows that on modern x86 CPUs, power side-channel attacks can be turned into (even remote!) timing attacks–lifting the need for any power measurement interface.

Second, Hertzbleed shows that, even when implemented correctly as constant time, cryptographic code can still leak via remote timing analysis.”

To Put Things in Perspective

To be fair, this is an incredibly exotic attack that would be extremely difficult for even the most experienced hackers in the world to pull off.  Even so, there are hackers out there in the world who have the skills to do this. That is why it’s somewhat disturbing that neither Intel nor AMD have any plans to issue a fix for the issues that make Hertzbleed possible.

Per an Intel spokesman:

“While this issue is interesting from a research perspective, we do not believe this attack to be practical outside of a lab environment.”

While that’s true, hackers have always been known for being more interested in bragging rights than practicality. In our view, it’s just a matter of time before we see Hertzbleed in the headlines.

Used with permission from Article Aggregator

Your AI Is Everywhere. Your Compliance Docs Shouldn't Be.

Your AI Is Everywhere. Your Compliance Docs Shouldn't Be.

AI didn’t roll out in one clean, controlled launch. It crept in…in different ways, in multiple places, at different times. Kind of like weeds in a...

Read the full blog
Mapping AI Decision Pipelines Into Documented Compliance Workflows

Mapping AI Decision Pipelines Into Documented Compliance Workflows

You know how kids like to ask “Why?" and "How come?” Questions like, “Why is water wet? How come you write with your left hand?” There are actually...

Read the full blog
IT Support Response Time in Portland: What SLAs Should You Expect?

IT Support Response Time in Portland: What SLAs Should You Expect?

Key Takeaways Response time is only part of the equation, resolution time is what truly impacts your business Portland businesses should expect...

Read the full blog

1 min read

E-Mail From Department Of Labor Could Be Phishing Attack

There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one.

Read the full blog
How to Talk to Clients About Data Security and ABA Cloud Compliance

1 min read

How to Talk to Clients About Data Security and ABA Cloud Compliance

Looking for a surefire way to lull a room full of lawyers into a coma? Start a conversation about data security and ABA cloud compliance, and watch...

Read the full blog

1 min read

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website? Do you also use the “All in One” SEO plugin?

Read the full blog