New Vulnerability in Apple MacBook Allows Hackers to Steal Cryptos
How MacBooks Are Vulnerable to Crypto Hacks
The issue is deeply ingrained in the microarchitecture of Apple's M1 and M2 chips. Consequently, a direct patch is impossible. Instead, mitigation requires adjustments in third-party cryptographic software, potentially compromising performance.
Data Memory-Dependent Prefetcher (DMP)
At the heart of this vulnerability is the DMP in these chips, which aims to predict and pre-load data, minimizing CPU and memory latency. However, the DMP's unique behavior can mistakenly interpret memory content as pointer addresses, leading to unintended data leakage through side channels.
GoFetch Attack
Experts like Boru Chen and Yingchen Wang explain that attackers exploit the DMP's behavior by crafting inputs that cause unintended data leakage. This vulnerability does not require high user privileges and is effective against both conventional and quantum-resistant encryption methods.
This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.