March 18, 2020 By Shane Schick 2 min read

Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.

Described in a deep-dive report published to warn software developers, Intel said the Snoop attacks were first brought to light by a software engineer.

The attacks allow bad actors to insert malicious code after a change in the L1D cache, at which point the CPU updates all cache levels in a process known as bus snooping. The L1 data sampling technique could then trigger errors to leak data from the CPU’s inner memory.

Cybercriminal Activity at the Cache Level

On a more technical level, the Snoop attacks are taking advantage of cache coherence, which ensures that the L1D cache is using data that is consistent with whatever has been stored across L1, L2 and L3 caches, along with the RAM. This is common in many of the multi-core architectures that run within server environments today, the report noted.

Companies are able to set up virtualized IT infrastructure and cloud computing environments, in part, because of the multi-core capabilities of modern chips made by hardware developers like Intel. If malware that infects a CPU via Snoop attacks leaks data from other cores, however, a single attack could have significant consequences.

On the other hand, it’s important to recognize that Snoop attacks are largely theoretical at this point. The Intel report said that creating the real-world conditions necessary to carry out the technique would be difficult.

Unlike some of the other vulnerabilities affecting Intel processors, such as Spectre and Meltdown, Intel said a Snoop attack would be unlikely to steal much data that cybercriminals could use.

Apply the Foreshadow Patches

Fortunately, Intel said those who might be affected by the vulnerability would be able to protect themselves by applying patches released two years ago, dubbed Foreshadow (L1TF). Turning off a feature in Intel CPUs known as Transactional Synchronization Extensions (TSX) will also make Snoop attacks harder to pull off, the company said.

Just in case, companies should also ensure they have backed up all data properly and invest in threat intelligence to stay aware of hardware vulnerabilities like L1 data sampling as they emerge.

More from

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

16 min read - Since March 2024, IBM X-Force has been tracking several large-scale phishing campaigns distributing the Grandoreiro banking trojan, which is likely operated as a Malware-as-a-Service (MaaS). Analysis of the malware revealed major updates within the string decryption and domain generating algorithm (DGA), as well as the ability to use Microsoft Outlook clients on infected hosts to spread further phishing emails. The latest malware variant also specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries…

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Threat intelligence to protect vulnerable communities

2 min read - Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint Cyber Defense Collaborative that addresses the threat to these vulnerable groups, with findings contributed by the X-Force Threat Intelligence team.Cyber criminals seek stolen credentialsThe HRCP…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today