Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Posted on October 1, 2025October 1, 2025 By CWS

Oct 01, 2025Ravie LakshmananEncryption / {Hardware} Safety
In one more piece of analysis, lecturers from Georgia Institute of Expertise and Purdue College have demonstrated that the safety ensures provided by Intel’s Software program Guard eXtensions (SGX) may be bypassed on DDR4 methods to passively decrypt delicate knowledge.
SGX is designed as a {hardware} function in Intel server processors that enables functions to be run in a Trusted Execution Setting (TEE). It basically isolates trusted code and assets inside what’s referred to as enclaves, stopping attackers from viewing their reminiscence or CPU state.
In doing so, the mechanism ensures that the information stays confidential even when the underlying working system has been tampered with or compromised by different means. Nevertheless, the newest findings present the restrictions of SGX.
“We present how one can construct a tool to bodily examine all reminiscence visitors inside a pc cheaply and simply, in environments with solely fundamental electrical instruments, and utilizing gear simply bought on the web,” the researchers mentioned. “Utilizing our interposer gadget in opposition to SGX’s attestation mechanism, we’re capable of extract an SGX secret attestation key from a machine in totally trusted standing, thereby breaching SGX’s safety.”
Just like the Battering RAM assault just lately disclosed by KU Leuven and the College of Birmingham researchers, the newly devised technique – codenamed WireTap – depends on an interposer that sits between the CPU and the reminiscence module to watch the information that flows between them. The interposer may be put in by a risk actor both by way of a provide chain assault or bodily compromise.

At its core, the bodily assault exploits Intel’s use of deterministic encryption to stage a full key restoration in opposition to Intel SGX’s Quoting Enclave (QE), successfully making it attainable to extract an ECDSA signing key that can be utilized to signal arbitrary SGX enclave stories.
Put in a different way, an attacker can weaponize the deterministic nature of reminiscence encryption to construct an oracle of kinds to interrupt the safety of constant-time cryptographic code.

“We’ve efficiently extracted attestation keys, that are the first mechanism used to find out whether or not code is operating below SGX,” the researchers mentioned. “This enables any hacker to masquerade as real SGX {hardware}, whereas actually operating code in an uncovered method and peeking into your knowledge.”
“Like two sides of the identical coin, WireTap and Battering RAM take a look at complementary properties of deterministic encryption. Whereas WireTap focuses primarily on breaching confidentiality, BatteringRAM focuses totally on integrity. The underside line is identical; nevertheless, each SGX and SEV are straightforward to interrupt utilizing reminiscence interposition.”
Nevertheless, whereas Battering RAM is a low-cost assault that may be pulled off utilizing gear costing lower than $50, the WireTap setup prices about $1,000, together with the logic analyzer.

In a hypothetical assault state of affairs focusing on SGX-backed blockchain deployments akin to Phala Community, Secret Community, Crust Community, and IntegriTEE, the research discovered that WireTap may be leveraged to undermine confidentiality and integrity ensures and permit attackers to reveal confidential transactions or illegitimately receive transaction rewards.
In response to the findings, Intel mentioned the exploit is exterior the scope of its risk mannequin because it assumes a bodily adversary that has direct entry to the {hardware} with a reminiscence bus interposer. Within the absence of a “patch,” it is beneficial that the servers be run in safe bodily environments and use cloud suppliers that present unbiased bodily safety.
“Such assaults are exterior the scope of the boundary of safety provided by Superior Encryption Customary-XEX-based Tweaked Codebook Mode with Ciphertext Stealing (AES-XTS) based mostly reminiscence encryption,” the chipmaker mentioned. “Because it offers restricted confidentiality safety, and no integrity or anti-replay safety in opposition to attackers with bodily capabilities, Intel doesn’t plan to situation a CVE.”

The Hacker News Tags:Attack, DDR4, ECDSA, Extracts, Intel, Interposer, Key, MemoryBus, SGX, WireTap

Post navigation

Previous Post: New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks
Next Post: Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms

Related Posts

Empower Users and Protect Against GenAI Data Loss The Hacker News
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat The Hacker News
5 BCDR Essentials for Effective Ransomware Defense The Hacker News
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog The Hacker News
The Silent Drivers Behind 2025’s Worst Breaches The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News