We May Soon See Malware Leveraging the Meltdown and Spectre Vulnerabilities

Haythem Elmir
0 1
Read Time1 Minute, 52 Second

Security researchers are seeing an ever-increasing number of malware samples that are experimenting with the Meltdown and Spectre vulnerabilities.

According to experts at AV-TEST, Fortinet, and Minerva Labs, several individuals are experimenting with publicly released proof-of-concept (PoC) code for the Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5715, CVE-2017-5753) vulnerabilities.

esearchers from AV-TEST have detected 119 malware samples that are related to the aforementioned CPU vulnerabilities.

Malware samples detected after release of PoC code

Malware samples started being detected on VirusTotal as soon as the researchers involved in the discover of the Meltdown and Spectre flaws began releasing PoC code for the two vulnerabilities.

According to a report from Fortinet, most of these samples include the PoC code or variations of it.

All evidence suggests most of these detections are security researchers playing with the PoC code, but experts won’t rule out that some samples are from malware authors looking for ways to weaponize the PoC code for malicious actions.

« I actually haven’t seen real in-the-wild samples yet, » Omri Moyal, co-founder and VP of research at Minerva Labs told Bleeping Computer. « Just a lot of PoC/research/tests. »

The rate at which new samples are being detected suggests more work is being put into experimenting with the POC code every day. Further, not all samples are uploaded on VirusTotal or other malware repositories, meaning professional malware authors are most likely playing with the code as well, just that most security researchers are blind what they’re working on.

Web exploitation vector has been confirmed

Meltdown and Spectre are severe vulnerabilities that when exploited grant attackers access to a wealth of information, from both the kernel memory space and from other apps.

Mozilla has already confirmed everybody’s worst fear, that Spectre is remotely exploitable by embedding attack code in mundane JavaScript files delivered via web pages.

The common train of thought is that these two flaws will be first seen in the malware portfolios of state-level actors before exploitation techniques enter the arsenals of exploit kit operators and spam groups.

To read the original article:

https://www.bleepingcomputer.com/news/security/we-may-soon-see-malware-leveraging-the-meltdown-and-spectre-vulnerabilities/

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Facebook a perdu un million d’utilisateurs en Amérique du Nord lors du dernier trimestre 2017

Pour la première fois depuis sa création, Facebook perd des utilisateurs aux USA et au Canada. Avec deux milliards de membres actifs, Facebook aurait-il atteint une sorte de plafond de verre, ou est-ce seulement un effet du social cooling dont nous vous parlions récemment ? Toujours est-il que le réseau […]