Cryptographic attacks on Apple Silicon CPUs
GoFetch The GoFetch project logo
Date discovered privately disclosed to Apple on 5 December 2023; 8 months ago (2023-12-05 ) ,[ 1] public announcement on 20 March 2024; 5 months ago (2024-03-20 ) [ 1] Discoverer Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin Affected hardware Apple silicon CPUs (M1, M2, M3 and A14) Website https://gofetch.fail/
GoFetch is a family of cryptographic attacks on recent Apple silicon CPUs that exploits the CPU's on-chip data memory-dependent prefetcher (DMP) to investigate the contents of memory.[ 2] [ 1] CPUs affected include the M1, M2, M3 and A14 series system-on-a-chip processors.[ 1]
The DMP looks at cache memory content for possible pointer values, and prefetches the data at those locations into cache if it sees memory access patterns that suggest following those pointers would be useful.[ 3] [ 4] The GoFetch attacks use those speculative cache fetches to undermine a number of different cryptographic algorithms by using memory access timings to exfiltrate data from those algorithms using timing attacks.
The authors of GoFetch state that they were unable to make their exploit work on the Intel Raptor Lake processor they tested due to its more limited DMP functionality.[ 1]
References [ edit ]
^ a b c d e "GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers" . gofetch.fail . Retrieved 2024-03-22 .
^ "Apple Silicon chip flaw can leak encryption keys, say researchers" . AppleInsider . 2024-03-21. Retrieved 2024-03-22 .
^ "Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest" . www.prefetchers.info . 2022-05-02. Retrieved 2024-03-30 .
^ Vicarte, Jose Rodrigo Sanchez; Flanders, Michael; Paccagnella, Riccardo; Garrett-Grossman, Grant; Morrison, Adam; Fletcher, Christopher W.; Kohlbrenner, David (May 2022). Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest . 2022 IEEE Symposium on Security and Privacy (SP) . San Francisco, CA, USA: IEEE. pp. 1491–1505. doi:10.1109/SP46214.2022.9833570 . ISBN 978-1-6654-1316-9 .
External links [ edit ]
Hacking in the 2020s
Major incidents
2020
BlueLeaks
Twitter account hijacking
European Medicines Agency data breach
Nintendo data leak
United States federal government data breach
EasyJet data breach
Vastaamo data breach
2021
Microsoft Exchange Server breach
Ivanti Pulse Connect Secure data breach
Colonial Pipeline ransomware attack
Health Service Executive ransomware attack
Waikato District Health Board ransomware attack
JBS S.A. ransomware attack
Kaseya VSA ransomware attack
Transnet ransomware attack
Epik data breach
FBI email hack
National Rifle Association ransomware attack
Banco de Oro hack
2022
Ukraine cyberattacks
Red Cross data breach
Anonymous and the Russian invasion of Ukraine
Viasat hack
DDoS attacks on Romania
Costa Rican ransomware attack
LastPass vault theft
Shanghai police database leak
Grand Theft Auto VI content leak
2023
Munster Technological University ransomware attack
Evide data breach
MOVEit data breach
Insomniac Games data breach
Polish railway cyberattack
British Library cyberattack
2024
XZ Utils backdoor
Kadokawa and Niconico
Change Healthcare ransomware attack
Ukrainian cyberattacks against Russia
2024 WazirX hack
Trump campaign hack
Fur Affinity domain hijacking
Groups
Anonymous
Anonymous Sudan
Berserk Bear
BlackCat
Clop
Cozy Bear
DarkMatter
DarkSide
Dridex
Ghostwriter
GnosticPlayers
Guacamaya
Hafnium
IT Army of Ukraine
Killnet
Lapsus$
LightBasin
LockBit
OceanLotus
REvil
Sandworm
Sakura Samurai
ShinyHunters
Wizard Spider
Individuals
Graham Ivan Clark
maia arson crimew
Kirtaner
Major vulnerabilities publicly disclosed
SMBGhost (2020)
Thunderspy (2020)
PrintNightmare (2021)
FORCEDENTRY (2021)
Log4Shell (2021)
Account pre-hijacking (2022)
Retbleed (2022)
Downfall (2023)
LogoFAIL (2023)
Reptar (2023)
Terrapin (2023)
GoFetch (2024)
Sinkclose (2024)
Malware