March 18, 2020 By Shane Schick 2 min read

Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.

Described in a deep-dive report published to warn software developers, Intel said the Snoop attacks were first brought to light by a software engineer.

The attacks allow bad actors to insert malicious code after a change in the L1D cache, at which point the CPU updates all cache levels in a process known as bus snooping. The L1 data sampling technique could then trigger errors to leak data from the CPU’s inner memory.

Cybercriminal Activity at the Cache Level

On a more technical level, the Snoop attacks are taking advantage of cache coherence, which ensures that the L1D cache is using data that is consistent with whatever has been stored across L1, L2 and L3 caches, along with the RAM. This is common in many of the multi-core architectures that run within server environments today, the report noted.

Companies are able to set up virtualized IT infrastructure and cloud computing environments, in part, because of the multi-core capabilities of modern chips made by hardware developers like Intel. If malware that infects a CPU via Snoop attacks leaks data from other cores, however, a single attack could have significant consequences.

On the other hand, it’s important to recognize that Snoop attacks are largely theoretical at this point. The Intel report said that creating the real-world conditions necessary to carry out the technique would be difficult.

Unlike some of the other vulnerabilities affecting Intel processors, such as Spectre and Meltdown, Intel said a Snoop attack would be unlikely to steal much data that cybercriminals could use.

Apply the Foreshadow Patches

Fortunately, Intel said those who might be affected by the vulnerability would be able to protect themselves by applying patches released two years ago, dubbed Foreshadow (L1TF). Turning off a feature in Intel CPUs known as Transactional Synchronization Extensions (TSX) will also make Snoop attacks harder to pull off, the company said.

Just in case, companies should also ensure they have backed up all data properly and invest in threat intelligence to stay aware of hardware vulnerabilities like L1 data sampling as they emerge.

More from

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Q&A with Valentina Palmiotti, aka chompie

4 min read - The Pwn2Own computer hacking contest has been around since 2007, and during that time, there has never been a female to score a full win — until now.Valentina Palmiotti, aka chompie, changed that. At the March 2024 competition, Palmiotti scored a full win with her discovery of an Improper Update of Reference Count bug to escalate privileges on Windows 11. It was her first time entering Pwn2Own.Pwn2Own is considered one of the most — if not the most — prestigious…

Self-replicating Morris II worm targets AI email assistants

4 min read - The proliferation of generative artificial intelligence (gen AI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in gen AI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers. How the Morris…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today