New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Introduction
A new type of side-channel attack named GPU.zip has recently been discovered that poses a threat to the security and privacy of individuals using modern graphics processing units (GPUs). This attack leverages hardware-based graphical data compression, a common optimization in today’s GPUs that improves performance. The vulnerability affects GPUs from major manufacturers such as AMD, Apple, Arm, Intel, Nvidia, and Qualcomm. Researchers from several universities in the United States, including the University of Texas at Austin, Carnegie Mellon University, University of Washington, and University of Illinois Urbana-Champaign, have detailed this new attack method.
The Exploitation Method
Unlike many other side-channel attacks, GPU.zip does not require direct access to the targeted device. Instead, it can be exploited by luring the user to a malicious website. The attack allows the malicious site to steal data from other websites that the victim has open at the same time. Specifically, the attack targets individual pixels from another site and steals information that is visible on the screen, such as usernames. This can potentially deanonymize a user and compromise their privacy.
The researchers demonstrated the attack on Wikipedia, successfully stealing a user’s username that was displayed in the top corner. While websites that hold sensitive information typically have measures in place to prevent this type of data leakage, there are still popular sites that remain vulnerable. It is important for developers to ensure that their websites are not susceptible to this attack by configuring them to deny being embedded by cross-origin sites.
Potential Impact
Although GPU.zip is a serious vulnerability, it is important to note that it takes a significant amount of time for a malicious site to obtain information through this attack method. In experiments conducted by the researchers, it took anywhere from 30 minutes to 215 minutes to obtain a Wikipedia username. Nevertheless, the potential risk remains, and it is crucial for users and organizations to take necessary precautions.
Response from Industry Players
The researchers responsible for discovering GPU.zip have shared their findings and proof-of-concept code with major GPU manufacturers, including AMD, Apple, Arm, Intel, Nvidia, and Qualcomm, back in March 2023. However, as of September 2023, none of these companies have committed to releasing patches to address the vulnerability. Google, who was also notified about this issue, is still deciding whether and how to fix it on the Chrome web browser.
It is concerning that several months have passed since the vulnerability was disclosed, and no significant action has been taken by these industry players. Given the potential impact on data privacy and security, it is crucial that manufacturers and software providers prioritize addressing this vulnerability and release patches to protect users.
Implications for Internet Security
The discovery of GPU.zip highlights the ongoing challenges in ensuring internet security. As technology advancements continue, new vulnerabilities emerge, putting user data at risk. Side-channel attacks like GPU.zip demonstrate the need for comprehensive security measures that consider both software and hardware components.
It is important for users to stay informed about potential threats and vulnerabilities and take necessary precautions to protect their data. In the case of GPU.zip, users should be cautious while browsing the web and avoid visiting unfamiliar or potentially malicious websites. Keeping software and operating systems up to date is also crucial as patches and updates often include security enhancements.
Conclusion
The GPU.zip side-channel attack represents a significant threat to the security and privacy of individuals using modern GPUs. With the potential to steal sensitive data by exploiting hardware-based graphical data compression, this vulnerability highlights the need for stronger security measures in both software and hardware components.
It is imperative for GPU manufacturers, software providers, and web developers to address this vulnerability promptly and release patches to protect users. Furthermore, users should stay vigilant and take necessary precautions to protect their data, such as visiting trusted websites and keeping their software up to date.
In the face of evolving cyber threats, it is crucial that we continue to prioritize internet security and privacy. The discovery of GPU.zip serves as a reminder that constant vigilance and proactive measures are necessary to safeguard our digital lives.
<< photo by Sigmund >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- Exploring the Rise of Rust-Written 3AM Ransomware
- The Stealthy Menace: Unleashing a New Breed of Malware
- The Rise of Mac Malware: Exposing the Dangerous Atomic Stealer Campaign
- New Title: The Critical Libwebp Vulnerability: A Looming Exploitation Threat Receiving a Maximum CVSS Score
- How Organizations are Failing to Prioritize Cybersecurity Investments
- Cyemptive Technologies: Accelerating Global Expansion into Middle East and the Americas
- The Hot Seat: Unveiling the Role of CISOs amid Evolving SEC Regulations
- The True Price of Compromised Credentials: Are You Prepared to Pay?
- TikTok’s API Restrictions Impede Analysis of US User Data, Academics Argue
- The Hidden Vulnerabilities of Data Protection: MOVEit Flaw Sparks Massive University Data Breaches
- Why Improving Cyber Hygiene is Crucial in the Fight Against Sophisticated Cyberattacks
- Why Visibility Alone Can’t Ensure the Security of Operational Technology Systems
- The Rise of Malware: How Thousands of Systems Have Become Proxy Exit Nodes
- Exploring the Critical Vulnerabilities in Microsoft Message Queuing: Assessing the Implications of Remote Code Execution and DoS Attacks on System Security
- Unmasking “Culturestreak”: The Hidden Threat of Malware in GitLab’s Python Package
- “The Growing Threat: Exploring the Rise of SMS-Based Phishing Attacks on Cloud Clients”
- The Dark Side of Power Management: Uncovering 9 Alarming Vulnerabilities in SEL’s Products