Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Posted on October 29, 2025October 29, 2025 By CWS

A group of educational researchers has disclosed the main points of a brand new assault methodology that can be utilized to interrupt CPU-based safety applied sciences from Intel and AMD by focusing on DDR5 reminiscence.

The assault methodology, named TEE.fail, was found by researchers from Purdue College and Georgia Institute of Expertise. 

The assault requires bodily entry to the focused system and includes putting a tool named an interposer between the pc’s CPU and reminiscence in an effort to research DRAM bus site visitors.

An attacker can then use the captured knowledge to extract cryptographic keys from Intel TDX and AMD SEV-SNP trusted execution setting (TEE) implementations. As well as, a hacker can extract attestation keys that may be leveraged to compromise Nvidia’s GPU Confidential Computing, which permits attackers to run AI workloads with none TEE protections, the researchers defined. 

These confidential computing applied sciences, used for knowledge facilities and cloud computing, are designed to guard code and knowledge from attackers who’ve compromised the host system, and even from malicious insiders. 

The TEE.fail assault includes soldering the interposer to the DIMM. The interposer constructed by the researchers, for which they’ve made accessible schematics, prices underneath $1,000 if off-the-shelf digital elements are used. 

TEE.fail is just like the not too long ago disclosed WireTap and Battering RAM assaults, which additionally concerned utilizing an interposer to seize precious knowledge from reminiscence. 

Nevertheless, there are some important variations. WireTap and Battering RAM solely labored in opposition to DDR4 reminiscence, whereas TEE.fail targets DDR5.Commercial. Scroll to proceed studying.

“The distinction is important, as TEE.fail can be utilized to assault the newest TEE choices by Intel and AMD, specifically Intel TDX and AMD SEV-SNP with Ciphertext Hiding, which supply confidential digital machines (CVMs),” the researchers defined. “As CVMs are used for the belief anchor in Nvidia’s GPU confidential computing, we present how our assault additionally breaks GPU attestation.”

Each Intel and AMD have printed advisories in response to the TEE.fail analysis. Nevertheless, as within the case of WireTap and Battering RAM, the chip giants mentioned assaults requiring bodily entry to the focused system are usually not in scope of their merchandise’ menace mannequin.

Associated: New CounterSEVeillance and TDXDown Assaults Goal AMD and Intel TEEs

Associated: RMPocalypse: New Assault Breaks AMD Confidential Computing

Associated: VMScape: Teachers Break Cloud Isolation With New Spectre Assault

Security Week News Tags:AMD, Attack, DDR5, Intel, Keys, Memory, Steal, Targets, TEEs

Post navigation

Previous Post: Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
Next Post: Microsoft Sued for Allegedly Misleading Millions to Subscribe for Microsoft 365 Subscriptions

Related Posts

In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak Security Week News
Checkout.com Discloses Data Breach After Extortion Attempt Security Week News
US and Allies Sanction Russian Bulletproof Hosting Service Providers Security Week News
Agentic Security Firm 7AI Raises $130 Million Security Week News
Data Stolen in Eurofiber France Hack Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark