New NetCAT Attack Can Leak Sensitive Data From Intel CPUs
#1
Exclamation 
Quote:A weakness named NetCAT (Network Cache ATtack) affects all Intel server-grade processors since 2012 and allows sniffing sensitive details by mounting a side-channel attack over the network.
Researchers from the VUSec group at Vrije Universiteit Amsterdam discovered that information present in the CPU cache on systems with Intel’s Data Direct I/O (DDIO) feature enabled.
 
DDIO is specific to Intel server-grade processors and is turned on by default on Intel Xeon E5, E7 and SP families from 2012 onwards.
Its purpose is to share the CPU cache with network devices and peripherals for better performance of server applications in fast networks.
NetCAT is a network-based attack that can be deployed to infer data in the CPU's last-level cache of a remote machine. VUSec researchers showed that an attacker controlling a machine on the network can use this method to infer confidential data from an SSH session without malicious software running on the target system.

Read more here: https://www.bleepingcomputer.com/news/se...ntel-cpus/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
K-Lite Codec Pack 19.0.5 / 19.0.7 Update
Changes in 19.0.7 ...harlan4096 — 05:52
AnyDesk 9.5.8 for Windows
AnyDesk 9.5.8 for ...harlan4096 — 05:50
Notepad++ v8.8.3
Notepad++ v8.8.3 s...harlan4096 — 05:49
Intel releases new Arc PRO graphics driv...
Intel’s new GPU dr...harlan4096 — 05:48
Microsoft caused and fixed a WSUS Synchr...
Reports about prob...harlan4096 — 05:47

[-]
Birthdays
Today's Birthdays
avatar (49)WillieVot
Upcoming Birthdays
avatar (45)RidgeDimb
avatar (36)ipumaqar
avatar (50)tanliorsPeri
avatar (42)lapedDow
avatar (48)rituabew
avatar (36)omyjul
avatar (40)papedDow
avatar (49)ArnoldFum
avatar (37)yfaza
avatar (48)Kevensi
avatar (38)boineDon
avatar (39)Grompelbawn
avatar (40)vkseogaF
avatar (36)usogy
avatar (39)ywixazok
avatar (37)ixoqe
avatar (35)pa.OpenTran

[-]
Online Staff
There are no staff members currently online.

>