Skip to content
Menu
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
Computer IT Services & Marketing
  • Technology
    • Managed Services
    • Computer Repair
    • Consulting
  • Cybersecurity
    • BDR
    • Network Security
    • Computer Security
    • Data Recovery
  • Communication
    • Cabling
    • Wireless Networking
    • Phones
  • Marketing
    • Website Development
    • Search Engine Optimization
    • Social Media & Online Presence
    • Location Scan
    • Website & Email Management
    • Online Advertising
    • Multimedia Design
    • Newsletter
  • CALL: 337-214-1172
Widgets

HOME  |  BLOG  |  REMOTE SUPPORT

Home
Support
Blog
Contact
Close Menu
Intel Server Processors Are Vulnerable To Attack
September 27 2019

Intel Server Processors Are Vulnerable To Attack

wukovits Blog, General Interest, Recent News, Security, Technology News

Researchers at Vrije Universiteit, in Amsterdam have discovered a disturbing new side-channel attack. All Intel server-grade processors made since 2012 are vulnerable to what has been dubbed NetCAT.

That stands for Network Cache Attack and it exploits a weakness in Intel’s Data Direct I/O (DDIO) feature.

DDIO is specific to Intel’s server-grade processors and is enabled by default on the Intel Xeon E5, E7 and SP families from 2012 onwards.  The idea behind DDIO is that enhances system performance by sharing the CPU with network devices and peripherals.

Unfortunately, a flaw in DDIO’s design gives hackers the ability to infer data in the CPU’s last-level cache of a remote machine.  Researchers were able to demonstrate that an attacker controlling a machine on the network can use this method to infer confidential data from an SSH session. That is, without running any sort of malware on the target system, which naturally makes it notoriously difficult to detect.

The researchers had this to say about their discovery:

“…with NetCAT, we can leak the arrival time of the individual network packets from a SSH session using a remote side channel.”

The researchers went onto explain that during an interactive SSH session, network packets are sent with each keystroke.  Via NetCAT, it is possible for an attacker to deduce what characters are typed inside an encrypted (SSH) session.

“For example, typing ‘s’ right after ‘a'” is faster than typing ‘g’ after ‘s.’  As a result, NetCAT can operate statistical analysis of the inter-arrival timings of packets in what is known as a keystroke timing attack to leak what you type in your private SSH session.”

As disturbing as that sounds, it should be noted that this is an incredibly exotic form of attack that has yet to be seen anywhere in the wild.  The day is surely coming when we do see hackers making use of this, but for the moment, it serves more as a dire warning of things to come than anything else.

Used with permission from Article Aggregator

Companies Are Losing Billions To Business Email Compromises LastPass User Credentials May Have Been Exposed To Hackers

Related Posts

Major Security Issues Found With Popular Android App

Android, Blog, General Interest, Recent News, Security, Technology News

Major Security Issues Found With Popular Android App

Apple M1 Macs Are Not Immune To Malware

Apple, Blog, General Interest, Malware and Virus Protection, Recent News, Security, Technology News

Apple M1 Macs Are Not Immune To Malware

Update Available To Fix Windows 10 Crashing Issue

Blog, General Interest, Microsoft, Recent News, Technology News, Windows

Update Available To Fix Windows 10 Crashing Issue

Recent Posts

  • Major Security Issues Found With Popular Android App
  • Apple M1 Macs Are Not Immune To Malware
  • Update Available To Fix Windows 10 Crashing Issue

Archives

Categories

Get a Domain Registered


$.99* .COM Domain! Get going with GoDaddy!

Back To Top
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
  • Home
  • Technology
  • Cybersecurity
  • Communication
  • Marketing
  • Newsletter
  • Blog
  • Support
  • Contact

BBB Logo

Bayou Technologies, LLC
✖
Bayou Technologies is a BBB Accredited Busines
A+
On a scale of A+ to F

Reviewed, Evaluated and Accredited

Meets All 26 Standards of Accreditation

BBB Accredited since 1/1/2012

Click here for BBB Business Report on Bayou Technologies, LLC

BBB Accredited:

BBB Rating as of:

Verify Bayou Technologies, LLC
Bayou Technologies, LLC © 2019
Website Development and Marketing in Lake Charles, Louisiana
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT