• About
  • Advertise
  • Careers
  • Contact
  • About
Thursday, April 16, 2026
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Researchers find malware samples that exploit Meltdown and Spectre

in Tech
Researchers find malware samples that exploit Meltdown and Spectre
0
SHARES
41
VIEWS
Share on FacebookShare on Twitter

It was inevitable. Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown.

If there is any good news, it’s that the majority of the samples appear to be in the testing phase, according to antivirus testing firm AV-TEST, or are based on proof-of-concept software created by security researchers. Still, the number is rising fast.

On January 17, AV-TEST reported that it had seen 77 malware samples. Six days later, that number had increased to 119, and by February 1, it was up to 139 samples.

The Meltdown and Spectre attack methods exploit a design flaw in branch prediction, where a CPU makes an educated guess on what it will compute or process next, and they allow malicious applications to bypass memory isolation to access the contents of memory. While the contents cannot be altered or destroyed, they can be read, which is bad enough.

JavaScript-based proof-of-concept exploit for Spectre

Shortly after the disclosure of the Spectre and Meltdown vulnerabilities last month, a JavaScript-based proof-of-concept exploit for Spectre appeared on the Internet. Security firm Fortinet examined all of the publicly available samples at the end of January and found 83 percent of the samples were all based on proof-of-concept code.

This means the malware writers are still experimenting and trying to find a good, working exploit. And since they are using JavaScript, it will likely come in the form of a web attack — which, in a way, is good news. Servers don’t browse the web, clients do. And Microsoft and Apple have already issued fixes for Windows and macOS. So if the bulk of exploits are JavaScript, hopefully they will stick to the client side where they can be locked down. The trick then becomes keeping it off the servers. And that assumes hackers will stick to JavaScript.

Intel has issued fixes for the exploit but had to pull them because they caused more harm than good, drawing the ire of Linux creator Linus Torvalds. Intel has just issued new BIOS fixes. Microsoft has issued its own Windows fix, and it had its share of problems as well.

If that weren’t bad enough, Malwarebytes discovered a fraudulent site targeting German users with a fake patch supposedly to fix Meltdown and Spectre but actually installs the Smoke Loader malware, which downloads other malicious payloads.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
ADVERTISEMENT
Next Post
5G won’t cope, terahertz will provide more bandwidth

5G won’t cope, terahertz will provide more bandwidth

Recommended

The future of Red Hat: How will IBM’s acquisition affect the company?

The future of Red Hat: How will IBM’s acquisition affect the company?

IoT roundup: Keeping an eye on energy use and Volkswagen teams with AWS

IoT roundup: Keeping an eye on energy use and Volkswagen teams with AWS

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In