One of the main goals of using cryptography is the achievement of the maximum degree of information protection. Crypto this question is particularly acute: here, security is achieved through a combination of private keys, hashes and different methods of data encryption. However, underlying all this is the computer hardware that has the vulnerability.
Holes in the Intel
Vulnerability in server processors, Intel researchers have found the free University of Amsterdam. A security hole called NetCAT as reducing Network Cache Attack. It is reported that the vulnerability can be found in all processors support mechanisms DDIO (Data Direct I/O Technology), and RDMA (Remote Direct Memory Access) from Intel.
If both functions are enabled, the processor may be the target of hacker attacks through the network. In a worst-case scenario an attacker can access data that is stored in the cache memory of the processor.
The main danger NetCAT to attack the hacker does not have to have physical access to the server. It can be made remotely via the network environment, and therefore under the threat there is a huge number of server processors.
Recall, Intel DDIO was introduced in 2011. Then, the company has positioned it as a way of increasing the throughput of the processor and reduce delays. Now she can be a vulnerable place to steal very important information, including that which allows you to access cryptocurrency wallets.
In theory, a hacker can even read and analyze the information about the pressed keys in parallel running on the attacked system encrypted SSH session. Intel know about the problem long enough and trying to minimize potential damage. In General, the vulnerability, according to company representatives, has a low level of risk. To hacker is able to extract important data, it allegedly will have to try very hard.
The researchers note that NetCAT can only be “the tip of the iceberg”. Attackers may be other ways of committing attacks that are very similar to NetCAT.
Fortunately, while none of cryptoendoliths not suffered directly because of the vulnerability. Note that the security of each of cryptomnesia remains in his own hands. Always try to include two-factor authentication on exchanges and never share their passwords. Large volumes of coins are best stored in cold wallets in a safe place. And follow these five rules of anonymity, they will help.
Even more interesting are looking for in our cryptodata millionaires! Also don’t forget to follow us on Yandex Zen.
SUBSCRIBE TO OUR CHANNEL IN THE TELEGRAM THAT YOUR COINS ARE ALWAYS SAFE!