Security News > 2021 > March > Google Releases PoC Exploit for Browser-Based Spectre Attack
Google last week announced the release of proof-of-concept code designed to exploit the notorious Spectre vulnerability and leak information from web browsers.
In 2019, the Google team responsible for Chrome's V8 JavaScript engine said that the attack can't be mitigated at the software level, arguing that security boundaries in browsers should be aligned with low-level primitives, such as process-based isolation.
To keep their users safe, browser makers have already implemented protections such as Site Isolation, Cross-Origin Read Blocking, and out-of-process iframes, with a variety of security features available for other application developers as well, including Cross-Origin Resource and Cross-Origin Opener Policies, and more.
In order to assess the effectiveness of such mitigations, Google's researchers have released JavaScript PoC code functional across multiple operating systems, architectures, and hardware variants, and which "Confirms the practicality of Spectre exploits against JavaScript engines."
"The demonstration website can leak data at a speed of 1kB/s when running on Chrome 88 on an Intel Skylake CPU. Note that the code will likely require minor modifications to apply to other CPUs or browser versions; however, in our tests the attack was successful on several other processors, including the Apple M1 ARM CPU, without any major changes," Google explains.
In addition to releasing the PoC, Google is making recommendations on how web developers can improve site isolation to deny access to cross-origin resources, thus effectively mitigating Spectre-style hardware attacks, among others.
News URL
Related news
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit (source)
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- Firefox Zero-Day Under Attack: Update Your Browser Immediately (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- Exploit released for new Windows Server "WinReg" NTLM Relay attack (source)
- Lazarus hackers used fake DeFi game to exploit Google Chrome zero-day (source)
- Samsung phone users under attack, Google warns (source)
- Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices (source)
- Emergency patch: Cisco fixes bug under exploit in brute-force attacks (source)