RealClearLife has reported on cyber criminals escalating capabilities in recent months. Hackers have been able to do everything from steal 21 million government records to swipe data entirely through the sounds your computer makes. Now they have an ingenious new approach. Andy Greenberg details how this method works for Wired. He writes:
“….new attacks use a technique Google researchers first demonstrated last March called ‘Rowhammer.‘ The trick works by running a program on the target computer, which repeatedly overwrites a certain row of transistors in its DRAM flash memory, ‘hammering’ it until a rare glitch occurs: Electric charge leaks from the hammered row of transistors into an adjacent row. The leaked charge then causes a certain bit in that adjacent row of the computer’s memory to flip from one to zero or vice versa. That bit flip gives you access to a privileged level of the computer’s operating system… It’s messy. And mind-bending. And it works.”
The obvious question: What can you do to protect yourself from this? The answer: for now, not a lot. Greenberg notes that this “kind of exploitation of hardware means that no software update can help.” However, there is hope, as researchers have “identified one countermeasure to Rowhammer’s memory charge leakage: a feature of DRAM called ‘error-correcting code’ constantly corrects abnormal levels of charge in any particular transistor.”
To read the full article (and be filled with a strong urge to get off the web forever), click here. To learn far more about how Rowhammer works, watch the video below.
This article was featured in the InsideHook newsletter. Sign up now.