3 weeks ago

Meltdown/Specter-based Malware Coming Soon to Devices Near You, Are You Ready?


This kind of has been few weeks since the details of the Spectre, in addition to Meltdown processor vulnerabilities turned out in public in addition to researchers have discovered more than 130 malware samples trying to exploit these chip flaws.

Spectre in addition to Meltdown are security vulnerabilities disclosed by security researchers earlier This kind of month in many processors through Intel, ARM in addition to AMD used in modern PCs, servers in addition to smartphones, among different devices.

These CPU vulnerabilities could enable attackers to bypass memory isolation mechanisms in addition to access everything, including memory allocated for the kernel containing sensitive data like passwords, encryption keys in addition to different private information.

Researchers through independent antivirus testing firm AV-TEST detected at least 139 malware samples, as of today, which are related to these CPU vulnerabilities, as shown inside the growth graph.

You can find SHA256 hashes for all malware samples here.

Meanwhile, cybersecurity firm Fortinet also tracked in addition to analyzed many malware samples ‘trying to exploit’ recently disclosed CPU vulnerabilities, most of which includes re-compiled or extended variation of the JavaScript-based proof-of-concept (PoC) exploit released last month.

“The rate at which the cybercriminal community is usually targeting known vulnerabilities is usually clearly accelerating, with the WannaCry in addition to NotPetya exploits serving as perfect examples of the need to patch vulnerable systems as soon as possible,” Fortinet said.

“Which is usually why our concerns were raised when we recently learned about some of the largest vulnerabilities ever reported—ones in which affect virtually every processor developed since 1995 by chip manufacturers Intel, AMD, in addition to ARM.”

Another news makes This kind of situation, even more, worse—Intel halted all its CPU firmware patches for the Meltdown in addition to Spectre flaws last week after This kind of caused issues like spontaneous reboots in addition to different ‘unpredictable’ system behaviour on affected PCs.

So, until Intel in addition to different vendors do not come up with stable security patches for the Meltdown in addition to Spectre attacks in which don’t cause systems to break, users are recommended to keep their operating system, web browsers, antivirus in addition to different software up-to-date.

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

3 + eighteen =