March 18, 2020 By Shane Schick 2 min read

Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.

Described in a deep-dive report published to warn software developers, Intel said the Snoop attacks were first brought to light by a software engineer.

The attacks allow bad actors to insert malicious code after a change in the L1D cache, at which point the CPU updates all cache levels in a process known as bus snooping. The L1 data sampling technique could then trigger errors to leak data from the CPU’s inner memory.

Cybercriminal Activity at the Cache Level

On a more technical level, the Snoop attacks are taking advantage of cache coherence, which ensures that the L1D cache is using data that is consistent with whatever has been stored across L1, L2 and L3 caches, along with the RAM. This is common in many of the multi-core architectures that run within server environments today, the report noted.

Companies are able to set up virtualized IT infrastructure and cloud computing environments, in part, because of the multi-core capabilities of modern chips made by hardware developers like Intel. If malware that infects a CPU via Snoop attacks leaks data from other cores, however, a single attack could have significant consequences.

On the other hand, it’s important to recognize that Snoop attacks are largely theoretical at this point. The Intel report said that creating the real-world conditions necessary to carry out the technique would be difficult.

Unlike some of the other vulnerabilities affecting Intel processors, such as Spectre and Meltdown, Intel said a Snoop attack would be unlikely to steal much data that cybercriminals could use.

Apply the Foreshadow Patches

Fortunately, Intel said those who might be affected by the vulnerability would be able to protect themselves by applying patches released two years ago, dubbed Foreshadow (L1TF). Turning off a feature in Intel CPUs known as Transactional Synchronization Extensions (TSX) will also make Snoop attacks harder to pull off, the company said.

Just in case, companies should also ensure they have backed up all data properly and invest in threat intelligence to stay aware of hardware vulnerabilities like L1 data sampling as they emerge.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today