Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label CPU. Show all posts

Building Trust Through Secure Financial Dealings


 

Unlike in the past, where money existed as physical objects rather than electronic data, today's financial market is about to be transformed into an increasingly digital one. The ability to protect digital financial assets has become a key priority for those working in the finance industry. 

There is an increasing likelihood that banks, investment houses, and insurance firms will be placed on the frontlines of a cyber-warfare that is rapidly deteriorating, targeted by criminals that are becoming more sophisticated by the day. 

It is especially crucial to note that the financial and insurance sectors are suffering the greatest losses from data breaches in 2023, averaging $5.17 million per incident, according to a report released by IBM in 2023. The digital transformation that has revolutionised the financial services industry has undoubtedly reduced friction, improved operational efficiency, and enhanced customer interactions. 

At the same time, it has increased vulnerabilities, exposing institutions and their clients to unprecedented risks. With the convergence of opportunity and threat, the need for rigorous cybersecurity measures has become an essential part of ensuring the survival and trust of the financial industry, not just as a necessity but as a defining necessity. 

There is a growing sense of importance to safeguarding financial institutions from cyber threats, commonly referred to as financial cybersecurity, and it has become one of the most important pillars of financial resilience for the financial industry. 

In addition to covering a wide range of protective measures, it also helps banks, credit unions, insurance firms, and investment companies to protect vast amounts of sensitive data and high-value transactions that they conduct daily. 

In spite of the fact that these organisations are entrusted with their clients' most sensitive financial details, cybercriminals remain prime targets for those seeking financial gain as well as ideological disruption. There are numerous threats to be aware of, and they range from sophisticated phishing attacks to increasingly complex ransomware strains such as Maze and Ryuk, to the more recent double extortion techniques designed to maximise the leverage of their victims. 

There have been numerous incidents recently that show how attackers can easily exfiltrate and publicly release millions of customer records in one single attack, with the effect of ripple effects across the global economy. In addition to these challenges, institutions are facing the rapid adoption of cloud technologies and managing sprawling supply chains that are inadvertently expanding their attack surface as a result of rapid digital transformation. 

In the context of this vulnerability, the 2020 SolarWinds compromise is an important reminder that stealthy intrusions are possible and that they can persist undetected for months while infiltrating critical financial systems, revealing the extent of these vulnerabilities. As customers increasingly trust digital platforms to handle their banking and investment needs, financial organisations are under tremendous pressure to deploy advanced security measures that can keep up with the evolving innovation of attackers. 

In addition to the immediate costs associated with ransom requests or stolen data, the stakes go much deeper than that. They threaten the very foundations of the financial system itself, and they threaten its stability and trust. A significant increase in remote work was sparked by the COVID-19 pandemic in 2024, leading to an unprecedented surge of cyberattacks, which not only persisted but also intensified.

In response to advancements in defence technology, cybercriminals have developed equally innovative offensive tactics as well, creating a constantly shifting battleground as a result. Among the most disruptive developments has been the rise of Malware-as-a-Service (MaaS), a service that makes sophisticated hacking tools accessible to a wider range of attackers, effectively lowering the barrier to entry.

In the same vein, artificial intelligence has been incorporated into criminal arsenals to make hyper-personalised attacks, which can include everything from deep-fake videos to cloned voices to highly convincing phishing campaigns tailored to individual targets. As far as financial institutions and accounting firms are concerned, the consequences are extremely severe. 

Global estimates indicate that data breaches will cost an average of $4.45 million per incident by 2023, which represents a 15 per cent increase over the past three years. Despite the financial toll of data breaches, reputational damage is also an existential concern, as firms face erosion of client trust and, in some cases, the necessity to close down their doors altogether due to reputational damage. 

In light of these convergences of risks, modern cybersecurity is not just a static protection, but a constant struggle to stay ahead of the game in terms of innovation and resilience. Financial institutions must understand the numerous layers of cybersecurity to be able to build resilient defences against a constantly changing threat environment. 

Across each layer, different roles are performed in safeguarding sensitive information, critical systems, and the trust of millions of customers. Network security, which is at the foundation of all computer networks and data communications, is one of the most important elements, ranging from firewalls and intrusion detection systems to secure virtual private networks to secure computer networks and data communications. 

Furthermore, application security is equally vital, as it ensures that banks and insurers are protected against vulnerabilities by testing their software and digital tools on a regular basis and by updating them regularly. 

The purpose of data security is to ensure that sensitive financial details remain safe and secure, whether they are in transit or at rest, by encrypting, masking, and implementing access controls to ensure that sensitive financial information does not fall into the hands of unauthorised users. 

Providing operational security in addition to these layers ensures that financial transactions remain accurate and confidential for the client. This is done through governing user permissions and data handling procedures, which safeguard data integrity and confidentiality. 

Finally, disaster recovery and business continuity planning ensure that, even if an institution suffers a breach or system failure, they have backups, redundant systems, and comprehensive recovery protocols in place to ensure it can quickly restore operations. 

It is important to note that despite the implementation of these frameworks, the finance industry continues to be threatened by sophisticated cyber threats, despite the fact that they have been in place for quite some time. Phishing campaigns remain among the most common and effective attacks, and fraudsters continue to pose as trusted financial organisations to trick users into disclosing sensitive data. 

There are many kinds of malware attacks, but the most devastating ones are ransomware attacks. They encrypt critical data and demand ransom payments from institutions that need to return to normal operations. 

A DDoS attack can also pose a significant challenge for online banks and trading platforms, overwhelming systems, often causing both financial and reputational damage in the process. Moreover, insider threats are particularly dangerous, whether they occur by negligence or by malice, given employees' privilege to access sensitive systems. 

Man-in-the-middle attacks, which intercept communications between clients and financial institutions, highlight the risk of digital financial interactions, with attackers intercepting data or hijacking transactions between clients and institutions. 

It can be argued that these threats collectively demonstrate the breadth and sophistication of the modern cyber threat and underline the importance of deploying multi-layered, adaptive security strategies in financial services. It is no longer just the U.S. government that is betting on Intel's growth. A new partnership between Intel and Nvidia has been formed to accelerate the development of artificial intelligence. 

In a deal designed to accelerate the development of artificial intelligence, Nvidia has acquired $5 billion worth of Intel shares as part of a new partnership. This agreement requires Intel to build personal computer chips incorporating Nvidia's GPUs, as well as custom CPUs, which will be embedded in Nvidia's AI infrastructure platforms.

Since Intel has been struggling to retain its previous position in computing in spite of fierce competition and rapidly advancing technology, this collaboration is an important one for the company. The company has, under Lip-Bu Tan's leadership, been going through a difficult restructuring process since he assumed the position of chief executive in March. This has involved hiring fewer employees, delayed construction of new facilities, and a renewed focus on securing long-term customers before expanding manufacturing capabilities. 

The Washington support has also played a critical role in Intel's revival efforts, although controversy has been associated with this as well. As the Biden administration pledged more than $11 billion in subsidies to Intel under the CHIPS Act, the Trump administration reversed course by arranging a deal in which the federal government would take a 10 per cent stake in Intel, thereby strengthening Intel's manufacturing base.

With this backdrop in mind, the partnership between Intel and Nvidia brings together two of the biggest players in the industry. By combining Intel’s established x86 ecosystem with Nvidia’s advanced artificial intelligence and accelerated computing technologies, it brings together the industry’s two most influential players. 

The market responded quickly to Intel's announcement: shares soared by more than 2 per cent on Thursday morning after the announcement, as analysts argued that the momentum could boost the S&P 500 to another record level. It is a significant achievement in the technology sector that Intel and Nvidia have come to an agreement that signals a transformational shift in the way innovation is being driven in an era of rapid digital transformation. 

Intel and NVIDIA have formed an alliance to combine Intel's x86 architecture and manufacturing capabilities with Nvidia's advanced artificial intelligence and accelerated computing capabilities. The alliance is expected to boost artificial intelligence infrastructure and improve processing efficiency, as well as unlock the next generation of computing solutions. 

Investors and stakeholders have many reasons to get excited about this collaboration, since it offers substantial opportunities for investors and stakeholders in the form of enhanced market confidence and an enhanced environment for the development of robust AI ecosystems for enterprise-level and consumer applications. 

The partnership not only provides financial and technological benefits, but it also illustrates the value of proactive adaptation to technological changes, showing how partnerships with government agencies and government-sponsored initiatives can enable businesses to maintain competitiveness. 

Furthermore, as cyber threats continue to rise alongside the digital transformation, integrating advanced artificial intelligence into computing platforms will strengthen security analytics, threat detection, and operational resilience at the same time. 

The Intel and Nvidia collaborations are creating a benchmark for industry leadership, sustainable growth, and market stability through aligning innovation with strategic foresight and risk-aware practices, demonstrating how forward-looking collaboration will shape the future of AI-driven computing and digital financial ecosystems.

New VMScape Attack Raises Concerns Over Virtual Machine Security



Researchers have revealed a new attack technique called VMScape that can break the security barriers between virtual machines and the systems that host them. This discovery is substantial because virtualization forms the backbone of today’s cloud computing environment, where multiple customers often share the same physical hardware. 

How the attack works

Modern processors use a performance trick known as speculative execution, where the CPU guesses the next steps of a program before it is certain. While this speeds up computing, past incidents like the Spectre vulnerability have shown that attackers can manipulate this feature to gain access to protected information.

VMScape builds on this concept. Instead of targeting an individual application, it allows a malicious virtual machine to influence how the host hypervisor, the software that manages multiple virtual machines, makes predictions during execution. By carefully crafting these interactions, attackers can cause the hypervisor to briefly access secret data, such as encryption keys, which then leaves behind subtle traces in the processor’s memory cache. The attacker can measure these traces and piece together the stolen information.

The researchers focused on QEMU, a widely used hypervisor component. By training the processor’s branch prediction structures, a malicious VM can trick QEMU into speculatively executing instructions that leak information. To make the attack more reliable, the team developed methods to clear out cache entries and bypass protections like Address Space Layout Randomization (ASLR).

In practice, they managed to extract information at about 32 bytes per second with near-perfect accuracy. This means that a 4KB encryption key could be stolen in just over two minutes, while the full attack process, including defeating ASLR, took around 13 minutes.

Which systems are impacted

According to the findings, VMScape affects a wide range of AMD processors from the first Zen generation up to Zen 5, as well as Intel’s Coffee Lake CPUs. The latest Intel architectures, such as Raptor Cove and Gracemont, are not vulnerable. Importantly, the attack does not require altering the host system or disabling existing mitigations, making it more concerning for shared environments like public cloud platforms.

The implications for cloud security are clear: if one customer’s virtual machine can read sensitive data from another, it undermines trust in multi-tenant platforms. However, it is important to note that this attack is complex, requires expert-level skills, and demands uninterrupted time to execute. Ordinary users are unlikely to be directly affected.

Next steps

The discovery highlights the ongoing challenge of securing speculative execution in modern CPUs. While vendors are expected to release updates and mitigations, system administrators and cloud providers will need to stay alert and apply patches as they become available. For most users, the best course of action is to ensure their providers are following these security updates.



Ransomware May Soon Target the Brain of Your Computer — Here's What You Need to Know

 



Cyberattacks are evolving fast, and one of the biggest threats on the horizon is ransomware that doesn't just take over your files but could directly attack your computer’s processor.

Usually, ransomware blocks access to your files or system until you pay money to get control back. But in the future, attackers might go deeper and mess with your computer’s central processing unit (CPU) — the part that controls everything your computer does.

This new kind of attack could change how your CPU works by tampering with a hidden set of instructions inside the chip, called microcode. These instructions are installed by companies like Intel and AMD and can only be updated by them. They help your CPU run smoothly and securely. If criminals figure out how to replace this microcode with harmful code, they could take over your computer entirely.

Although this might sound like science fiction, it's starting to become more real. Researchers recently found a way to insert custom code into an AMD processor by using a flaw. They managed to change how the CPU handles random numbers — a small change, but proof that deeper control is possible.

A cybersecurity expert from Rapid7 has even created a working example of this type of attack. While it's not being shared publicly, it shows that this type of threat may not be far off. Once such ideas are out in the open, it's only a matter of time before bad actors attempt to use them.

Some tools already exist that allow hackers to sneak malicious programs into the firmware — the part of your computer that runs before the operating system loads. These tools are sold online and used by cybercriminals to secretly gain access to computers.

Right now, there are no known real-world attacks that target the CPU in this way, and it may still be years before it becomes a serious problem. However, it’s smart to be prepared.


Here’s how you can reduce your risk:

1. Keep your BIOS and firmware updated regularly, since companies release updates to fix problems.

2. Use reliable antivirus software to catch other types of ransomware early.

3. Don’t open unknown emails or click suspicious links.

4. Only install programs from websites you trust.


While this type of ransomware isn't common today, the fact that it's possible means we should stay alert. Updating your system and being cautious online are simple steps that can go a long way in keeping your device safe.

New Apple Processor Vulnerabilities: FLOP and SLAP Exploit Speculative Execution

 

Security researchers have uncovered two new vulnerabilities in modern Apple processors, named FLOP and SLAP, which could allow attackers to remotely steal sensitive data through web browsers. Discovered by researchers from the Georgia Institute of Technology and Ruhr University Bochum, these flaws exploit speculative execution, a performance optimization feature in Apple’s processors, to extract private user data from browsers like Safari and Chrome.

How FLOP and SLAP Exploit Speculative Execution

Speculative execution is a technique used by modern processors to predict and execute instructions in advance, improving performance. However, flaws in its implementation have led to significant security issues in the past, such as the Spectre and Meltdown attacks. FLOP and SLAP build on these exploits, demonstrating how Apple’s latest chips can be manipulated to leak private information.

FLOP (False Load Output Prediction) affects Apple’s M3, M4, and A17 processors. These chips attempt to predict not only which memory addresses will be accessed but also the actual data values stored in memory. If a misprediction occurs, the CPU may use incorrect data in temporary computations. Attackers can exploit this by measuring cache timing differences, allowing them to extract sensitive information before the system corrects itself. Researchers demonstrated FLOP by stealing private user data, including email details from Proton Mail, Google Maps location history, and iCloud Calendar events.

SLAP (Speculative Load Address Prediction) impacts Apple’s M2 and A15 processors, along with later models. Unlike FLOP, which predicts data values, SLAP manipulates the processor’s ability to anticipate which memory address will be accessed next. By training the CPU to follow a specific pattern and then suddenly altering it, attackers can force the processor to read sensitive data. The CPU processes this information before realizing the mistake, leaving traces that hackers can analyze. Researchers used SLAP to extract Gmail inbox content, Amazon order history, and Reddit activity.

Implications and Mitigation Efforts

Both FLOP and SLAP are particularly concerning because they can be executed remotely. A victim only needs to visit a malicious website running JavaScript or WebAssembly code designed to exploit these vulnerabilities. The attack does not require malware installation or direct access to the device, making it difficult to detect or prevent.

The researchers disclosed the flaws to Apple in early 2024. While Apple has acknowledged the issues, security patches have not yet been released. Apple has stated that it does not consider the vulnerabilities an immediate risk but has not provided a timeline for fixes. In the meantime, users concerned about potential data exposure can disable JavaScript in their browsers, though this may break many websites.

These findings highlight the growing sophistication of web-based attacks and the need for stronger security measures in modern processors. As Apple works on mitigating these vulnerabilities, users should stay informed about security updates and exercise caution when browsing unfamiliar websites.

The discovery of FLOP and SLAP underscores the ongoing challenges in securing modern processors against advanced exploits. While speculative execution enhances performance, its vulnerabilities continue to pose significant risks. As cyber threats evolve, both hardware manufacturers and users must remain vigilant, adopting proactive measures to safeguard sensitive data and maintain digital security.

Are GPUs Ready for the AI Security Test?

 


As generative AI technology gains momentum, the focus on cybersecurity threats surrounding the chips and processing units driving these innovations intensifies. The crux of the issue lies in the limited number of manufacturers producing chips capable of handling the extensive data sets crucial for generative AI systems, rendering them vulnerable targets for malicious attacks.

According to recent records, Nvidia, a leading player in GPU technology, announced cybersecurity partnerships during its annual GPU technology conference. This move underscores the escalating concerns within the industry regarding the security of chips and hardware powering AI technologies.

Traditionally, cyberattacks garner attention for targeting software vulnerabilities or network flaws. However, the emergence of AI technologies presents a new dimension of threat. Graphics processing units (GPUs), integral to the functioning of AI systems, are susceptible to similar security risks as central processing units (CPUs).


Experts highlight four main categories of security threats facing GPUs:


1. Malware attacks, including "cryptojacking" schemes where hackers exploit processing power for cryptocurrency mining.

2. Side-channel attacks, exploiting data transmission and processing flaws to steal information.

3. Firmware vulnerabilities, granting unauthorised access to hardware controls.

4. Supply chain attacks, targeting GPUs to compromise end-user systems or steal data.


Moreover, the proliferation of generative AI amplifies the risk of data poisoning attacks, where hackers manipulate training data to compromise AI models.

Despite documented vulnerabilities, successful attacks on GPUs remain relatively rare. However, the stakes are high, especially considering the premium users pay for GPU access. Even a minor decrease in functionality could result in significant losses for cloud service providers and customers.

In response to these challenges, startups are innovating AI chip designs to enhance security and efficiency. For instance, d-Matrix's chip partitions data to limit access in the event of a breach, ensuring robust protection against potential intrusions.

As discussions surrounding AI security evolve, there's a growing recognition of the need to address hardware and chip vulnerabilities alongside software concerns. This shift reflects a proactive approach to safeguarding AI technologies against emerging threats.

The intersection of generative AI and GPU technology highlights the critical importance of cybersecurity in the digital age. By understanding and addressing the complexities of GPU security, stakeholders can mitigate risks and foster a safer environment for AI innovation and adoption.


Novel Downfall Bug is Targeting Intel CPUs to Steal Encryption Keys, and Data

 

Remember those severe Meltdown and Spectre CPU bugs that were discovered nearly five years ago? Intel is once again in hot water due to a severe vulnerability that impacts chips dating back years. 

The vulnerability, dubbed "Downfall," exploits a flaw in the AVX vector extensions of every Intel CPU from Skylake to the most current 12th-generation Alder Lake chips.

Macs using these processors first appeared in late 2015, with the 21.5-inch iMac, and nearly every Intel-based Mac-desktop or laptop-since then has been affected. Apple started employing its own CPUs in 2020, rather than the newer 12th and 13th-generation Intel processors (which aren't affected by the vulnerability anyhow). 

What exactly is Downfall? 

Daniel Moghimi, the researcher who identified the vulnerability, developed a microsite about it and summarises it as follows: 

Downfall attacks exploit a fundamental flaw identified in billions of current CPUs used in personal and cloud systems. This vulnerability, CVE-2022-40982, allows an individual to get access to and steal data from other users that use the same machine.

For example, a malicious app downloaded from an app store might utilise the Downfall attack to steal sensitive information such as passwords, encryption keys, and private data such as banking information, personal emails, and messages.

Similarly, in cloud computing environments, a malevolent customer might exploit the Downfall vulnerability to steal data and passwords from other customers that share the same cloud server. 

Intel was first made aware of the vulnerability last summer, but it has only now been made public to give Intel time to develop a fix. Users would receive updates from their hardware makers in the form of microcode, which Intel has only started to release for its chips to address the problem. 

Which Macs are impacted? 

It's unknown whether Macs are impacted at this time. A chip that is on Intel's list of impacted products is used inside nearly every Mac starting with the Skylake generation (starting in late 2015) that has an Intel CPU inside. Your CPU is almost probably impacted if you own an Intel-based Mac that was produced in 2016 or later (or an iMac that was released in late 2015). 

But Macs are quite distinctive. Custom motherboards and firmware have been used in Intel Macs, and some of them even had the powerful T2 processor. Until we hear from Apple, it's difficult to say for sure if any of this would necessarily stop an attack exploiting the Downfall vulnerability. 

What needs to be done next? Is a fix available? 

There isn't much you can do but wait if you own a Mac built in late 2015 or later; yet, you can be affected. If a processor microcode upgrade is required or further mitigations are required, Apple will release a macOS update. You don't need to be concerned if your Mac is Apple Silicon-based (it has an M1 or M2-based processor). 

Using only software from reputable sources is a smart idea at all times. Compared to the most recent release from a well-known company like Microsoft, Google, or something from the Mac App Store, the tool you downloaded from a website you had never heard of carries a much higher chance of virus.

'Hot Pixel' Attack Exploits Novel GPUs and SoCs to Siphon Browsing History

 

An innovative cyberattack technique known as "Hot Pixel," which targets the complex interactions between graphic processing units (GPUs), contemporary system-on-a-chip (SoC), and browser data, has been discovered through a historic partnership between the University of Michigan, Ruhr University Bochum, and Georgia Tech. 

The "Hot Pixel" attack varies from conventional security flaws, as it bypasses modern side-channel defences by taking advantage of data-dependent computation cycles in GPUs and SoCs to steal information from Chrome and Safari browsers. 

The inherent difficulties that contemporary processors have in managing power consumption and heat dissipation, especially at high execution rates, served as the foundation for the researchers' finding. This disproportion generates a distinct digital fingerprint that can be recognised and examined. 

By removing pixels from the content being displayed in the target's browser, the "Hot Pixel" attack takes advantage of these peculiarities to deduce a device's navigation history. The attackers were able to quickly determine the data being processed by observing how the processor behaved differently under various browsing circumstances.

“The rendered image of a webpage may contain private information that should be isolated from scripts running on the page,” the research paper reads. “Examples include embeddings of cross-domain content through the use of iframe elements, and the rendering of hyperlinks, which indicates whether they have been visited.”

In the Chrome and Safari web browsers, researchers ran several CPU and GPU tests. They were able to steal data based on pixels from Chrome with an accuracy range of 60% to 94%, and it took them between 8.1 and 22.4 seconds to decode each pixel. 

Sending cookies to iframe elements is prohibited by Safari's anti-pixel-stealing policy if their origin is different from the parent page of the attacker. However, the researchers found that by burying URLs to sensitive sites on their site, attackers can still exfiltrate the victim's browsing history. 

Attackers might simply ascertain whether their victim had previously visited a particular address because links are presented differently if they have been previously viewed.

The researchers suggest the following measures to stop attacks similar to Hot Pixel: 

  • Minimise devices that are thermally restricted 
  • Enforce hardware constraints by keeping systems' temperatures within acceptable ranges 
  • Remove secrets from iframes' visible content by separating cookies from cross-origin iframes
  • Get rid of unauthorised access to sensor readings (OS-level mitigation)