Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » $50 batter ram attack breaks Intel and AMD cloud security protections
Identity

$50 batter ram attack breaks Intel and AMD cloud security protections

userBy userSeptember 30, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A group of scholars at the University of Birmingham have demonstrated a new vulnerability called Batting RAM to bypass the latest defenses of Intel and AMD cloud processors.

“We quietly sat in the memory path and built a simple $50 interposer that behaves transparently during startups and passes all trust checks,” researchers Jesse de Muhlemes, David Oswald, Ingrid Barbauede and Joe Van Brook said on the website publishing their findings. “Later, simply flip the switch over and the interposer will spin maliciously, silently redirecting the protected address to an attacker-controlled location, allowing for corruption and replay of encrypted memory.”

Butterram features Intel’s Software Guard Extension (SGX) and AMD’s Secure-Nested Paging (SEV-SNP) hardware security features.

It uses DDR4 memory to impact all systems, especially those relying on sensitive computing workloads running in public cloud environments, and protect data from cloud service providers using hardware-level access control and memory encryption.

In a nutshell, this attack leverages custom built, low-cost DDR4 interposer hardware hacking to secretly redirect physical addresses and gain unauthorized access to protected memory areas. Interposers can be built for less than $50 using simple analog switches, actively manipulating signals between the processor and memory.

On the Intel platform, RAM fires up to provide arbitrary read access to the victim’s plain text, or use attacks on AMD systems to avoid recent firmware mitigation to Budrum, documented by researchers in December 2024, or introduce any reverse machine into any reflux without rising.

DFIR Retainer Service

The successful exploitation of vulnerabilities limits physical access to enable fraudulent cloud infrastructure providers or insiders to compromise remote proofs and insert any backdoor into protected workloads.

The vulnerability was reported to vendors earlier this year, and then Intel, AMD and ARM responded that physical attacks are currently considered out of range. However, researchers pointed out that protecting against abuse RAM requires a basic redesign of memory encryption itself.

“Batting RAM exposes the basic restrictions on the scalable memory encryption designs currently used by Intel and AMD. […] You can introduce dynamic memory alias at runtime. As a result, you can avoid Boot-Time Alias ​​Checks from Intel and AMD by firing RAM. ”

This disclosure comes when AMD released an attack called Hercules and a relaxation for a repositioning voice disclosed by the University of Toronto and EthZürich, respectively.

“We are a great source of energy,” said David Lee, director of the Schwarz-Risman Institute (SRI) at the University of Toronto. “So when data is relocated, AMD hardware decrypts it from its old location and re-encrypts it to its new location. But what we found is that doing this over and over again allows malicious hypervisors to learn patterns repeatedly from within the data, which could lead to privacy violations.”

Last month, researchers at EthZürich also demonstrated that CPU optimization, known as stack engines, can be abused as a side channel for attacks that lead to information leakage. A proof of concept (POC) has been developed for AMD Zen 5 machines, and all models are believed to have this “abusable hardware feature.”

The discovery of Batting RAM follows a report from researchers at Vrije Universiteit Amsterdam about a new realistic attack technique called L1TF reload, which combines an L1-terminal fault (also known as Foreshadow) with a half-spectral gadget, and a new realistic attack technique that combines leaked memory from Memichines, which runs a public cloud service.

“L1TF is a CPU vulnerability that allows (attacker) VMs to speculatively read data residing in the (Core-Local) L1 data cache, including data that the VM cannot access,” said a VUSEC researcher. “At a high level, L1TF abuses this and gets primitive to get any RAM.”

CIS Build Kit

Google provided researchers with only tenant nodes to conduct research safely without affecting other customers, and awarded a $151,515 bug award and “fixes applied to affected assets.” Amazon said that the L1TF reloaded vulnerability does not affect guest data for AWS customers running on AWS Nitro System or Nitro Hypervisor.

The Spector, first revealed in early 2018, continues to plague modern CPUs, albeit in a variety of forms. Two weeks ago, scholars at EthZürich devised a new attack known as VMScape (CVE-2025-40300, CVSS score: 6.5) that breaks the virtualization boundary of AMD Zen CPUs and Intel Coffee Lake processors.

It is described as a cloud-targeted Spector Branch Target Injection (SPectre-BTI) attack, which leverages the separation gap between user and supervisor mode hosts and guests to leak arbitrary memory from unfixed QEMU processes. Software fixes have been introduced in the Linux kernel to counter the primitive cross-virtualized BTI (VBTI) attacks.

“VMScape can leak memory of the Qemu process at a rate of 32 b/s on an AMD Zen 4,” the authors said in their study. “Use VMScape to find the location of the secret data, leak the secret data all within 772 seconds, and extract the encryption key used for disk encryption as an example.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai is launching its own Tiktok rival, Sora app, alongside the Sora two models
Next Article Former Openai and Deepmind researchers are growing a whopping $300 million in seeds to automate science
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.