674490d95543b

Page: « 1 2 [3]
674490d956366
7 Guests are here.
 

Topic: Meltdown & Spectre
Page: « 1 2 [3]
Read 11238 times  

674490d956c1e
heise.de: "Meltdown & Spectre: Immer mehr Malware, echte Angriffe unklar"

blog.fortinet.com: "The exponential growth of detected malware targeted at meltdown and spectre"

https://mobile.twitter.com/avtestorg/status/959015892997861376:
Q: Are any of these remotely executable/ implemented in javascript?

A: Most samples are binaries (compiled for Windows, Linux and MacOS), but we also found the first working JavaScript PoC for Spectre. The latest (just-released) versions of e.g. Chrome and Firefox includes special fixes, so at least the PoC won't work anymore.

--------------

« Last Edit: 09. February 2018, 15:26:01 by fox »
674490d956ee7
heise.de: "MeltdownPrime & SpectrePrime: Neue Software automatisiert CPU-Angriffe"
Nach Meltdown und Spectre hatten Experten prognostiziert, dass das Zuschneiden auf spezifische Chips eine Weile dauern würde. Dieser Prozess lässt sich nun durch Automatisierung beschleunigen. Dabei wurden auch neue Variationen der Angriffe gefunden.

------------

heise.de: "Meltdown und Spectre: Flut an Sammelklagen gegen Intel"

Chip-Riese Intel führt in seinem Form-10-K-Jahresbericht an die US-Börsenaufsicht SEC auf, dass derzeit 32 Klagen wegen der Sicherheitslücken Meltdown und Spectre gegen den Konzern anhängig sind. In 30 davon fodern Käufer von Intel-Prozessoren angemessene finanzielle Entschädigungen.

Bei den beiden übrigen handelt es sich laut dem Form-10-K-Bericht um "securites class action lawsuits" von Aktionären. Sie werfen Intel vor, im Zeitraum zwischen Entdeckung der Lücke im Sommer 2017 und der Bekanntgabe Anfang Januar 2018 falsche oder irreführende Aussagen zu Produkten und zum internen Kontrollsystem des Konzerns gemacht zu haben. Intels Chef Brian Krzanich steht zudem wegen seines Verkaufs von Unternehmensaktien unter Rechtfertigungsdruck. Er hatte im November, also noch vor Bekanntgabe der dramatischen Sicherheitslücken Intel-Aktien im Wert von 24 Millionen US-Dollar verkauft.
« Last Edit: 18. February 2018, 10:05:50 by fox »
Acknowledged by: JML
674490d957094
heise.de: "Spectre-Lücke: Intels Microcode-Updates für Linux und Windows"

-------------

Vaguely related but interesting:

https://www.amdflaws.com/
13 Critical Security Vulnerabilities and Manufacturer Backdoors discovered throughout AMD Ryzen & EPYC product line

heise.de: "Sicherheitsforscher beschreiben 12 Lücken in AMD-Prozessoren"
« Last Edit: 14. March 2018, 16:35:53 by fox »
674490d957395
Yes, the linked heise-article also mentions the dubious origins (with Israeli intelligence connections) and the missing proof. Remains to be seen how this one unfolds. Thanks for the link, it's an interesting analysis.

-----

There's some confirmation now.

AMD: "A raft of flaws in AMD chips makes bad hacks much, much worse"

-----

For some extra spice you can follow these private detectives right here:
https://forums.anandtech.com/threads/amdflaws-com-what-is-this.2540299/page-6#post-39344342
« Last Edit: 15. March 2018, 19:07:49 by fox »
674490d9574f9
heise.de: "Weiterer Experte bestätigt Sicherheitsprobleme in AMD Ryzen und Epyc"

-----

Some more insight into the situation and the company...

AnandTech.com:  "Our interesting call with CTS-Labs"

The CTS-guys did sound pretty reasonable, at least until the journalists asked them questions that rubbed them the wrong way at the end. There are a few shades of grey to be found here when comes to their motivation and business.
« Last Edit: 16. March 2018, 17:04:33 by fox »

674490d95770bvoodoo47

674490d957758
weren't CTS revealed as frauds? basically, an offshoot of some shady company that earns money by manipulating stock prices.
674490d957864
From what I gather, the security flaws (at least some, maybe all?) are real, but involve having access to the HW so not that relevant to average joe home user (?). However how and why CTS "discovered" and published them, is apparently quite shady.
674490d9579e8
Yes, any security flaw that requires physical access to the victim's hardware (not counting a broadband cable, obviously) is pretty much irrelevant for most home users, and arguably most businesses, I'd have thought, though I don't know which of the new flaws (if they are genuine) fall into this category as I've not yet read up on them or on experts' opinions on them.
674490d957b4b
CTS are a shady operation but obviously they aren't frauds (in terms of their research). Most of the vulnerabilities do not require physical access to the HW but administrative access (meaning root). These aren't going to become weapons of mass destruction but as part of specialized attacks they are able to compromise systems so deeply that they can never be considered trustworthy again.
« Last Edit: 21. March 2018, 16:36:35 by fox »
674490d957c97
blog.frizk.net: "Total Meltdown?"

heise.de: "Kernel-Lücke Total Meltdown: Meltdown-Patch für Windows 7 verschlimmert die Lage dramatisch"

Apparently, it has been fixed already and only Windows 7 x64 systems patched with the 2018-01 or 2018-02 patches are vulnerable.
674490d957e1c
Thanks. In my mind I just moved closer to possibility to change my last desktop system to Linux Mint before the EOL of Win7 in 2020.
674490d95810e
heise.de: "Spectre-NG: Intel-Prozessoren von neuen hochriskanten Sicherheitslücken betroffen"

guru3d: "Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical"

---

heise.de: "Windows 10 1803 ohne Microcode-Updates gegen Spectre V2"

Oh and Intel stock is currently about 7$ higher then when the news about Meltdown/Spectre V2 broke in January and it appears that Krzanich is still not being investigated by the SEC for possible insider trading.

In other news, Cambridge Analytica is now called Emerdata, Raider is still Twix and in response to the massive data leak, Facebook is now aiming to become the new Tinder.
« Last Edit: 04. May 2018, 13:11:06 by fox »
Acknowledged by: JML
674490d9584b2
The researchers have validated the Spectre1.1 and Spectre1.2 attacks on both Intel x86 and ARM processors.
Softpedia.com: "New Variant of Spectre Security Flaw Discovered: Speculative Buffer Overflows"
Acknowledged by: fox
674490d958794
Ouuff. Looks like highly scientific gobbledygook to me. Thanks though!
Acknowledged by: fox
7 Guests are here.
I'm getting out of here right now, and you guys are invited.
Page: « 1 2 [3]
Contact SMF 2.0.19 | SMF © 2016, Simple Machines | Terms and Policies
FEEP
674490d9592d0