2 weeks ago
9 Views

Meltdown/Specter-based Malware Coming Soon to Devices Near You, Are You Ready?

meltdown-spectre-malware-hacking

in which has been few weeks since the details of the Spectre, in addition to Meltdown processor vulnerabilities became available in public in addition to researchers have discovered more than 130 malware samples trying to exploit these chip flaws.

Spectre in addition to Meltdown are security vulnerabilities disclosed by security researchers earlier This particular month in many processors via Intel, ARM in addition to AMD used in modern PCs, servers in addition to smartphones, among some other devices.

These CPU vulnerabilities could enable attackers to bypass memory isolation mechanisms in addition to access everything, including memory allocated for the kernel containing sensitive data like passwords, encryption keys in addition to some other private information.

Researchers via independent antivirus testing firm AV-TEST detected at least 139 malware samples, as of today, which are related to these CPU vulnerabilities, as shown inside the growth graph.

You can find SHA256 hashes for all malware samples here.

Meltdown Specte Malware

Meanwhile, cybersecurity firm Fortinet also tracked in addition to analyzed many malware samples ‘trying to exploit’ recently disclosed CPU vulnerabilities, most of which includes re-compiled or extended type of the JavaScript-based proof-of-concept (PoC) exploit released last month.

“The rate at which the cybercriminal community is actually targeting known vulnerabilities is actually clearly accelerating, with the WannaCry in addition to NotPetya exploits serving as perfect examples of the need to patch vulnerable systems as soon as possible,” Fortinet said.

“Which is actually why our concerns were raised when we recently learned about some of the largest vulnerabilities ever reported—ones in which affect virtually every processor developed since 1995 by chip manufacturers Intel, AMD, in addition to ARM.”


Another news makes This particular situation, even more, worse—Intel halted all its CPU firmware patches for the Meltdown in addition to Spectre flaws last week after in which caused issues like spontaneous reboots in addition to some other ‘unpredictable’ system behaviour on affected PCs.

So, until Intel in addition to some other vendors do not come up with stable security patches for the Meltdown in addition to Spectre attacks in which don’t cause systems to break, users are recommended to keep their operating system, web browsers, antivirus in addition to some other software up-to-date.

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

17 + fourteen =