Security News > 2021 > March > Google Releases PoC Exploit for Browser-Based Spectre Attack

Google last week announced the release of proof-of-concept code designed to exploit the notorious Spectre vulnerability and leak information from web browsers.
In 2019, the Google team responsible for Chrome's V8 JavaScript engine said that the attack can't be mitigated at the software level, arguing that security boundaries in browsers should be aligned with low-level primitives, such as process-based isolation.
To keep their users safe, browser makers have already implemented protections such as Site Isolation, Cross-Origin Read Blocking, and out-of-process iframes, with a variety of security features available for other application developers as well, including Cross-Origin Resource and Cross-Origin Opener Policies, and more.
In order to assess the effectiveness of such mitigations, Google's researchers have released JavaScript PoC code functional across multiple operating systems, architectures, and hardware variants, and which "Confirms the practicality of Spectre exploits against JavaScript engines."
"The demonstration website can leak data at a speed of 1kB/s when running on Chrome 88 on an Intel Skylake CPU. Note that the code will likely require minor modifications to apply to other CPUs or browser versions; however, in our tests the attack was successful on several other processors, including the Apple M1 ARM CPU, without any major changes," Google explains.
In addition to releasing the PoC, Google is making recommendations on how web developers can improve site isolation to deny access to cross-origin resources, thus effectively mitigating Spectre-style hardware attacks, among others.
News URL
Related news
- PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks (source)
- Google fixes Android zero-days exploited in attacks, 60 other flaws (source)
- Browser extensions make nearly every employee a potential attack vector (source)
- Phishers abuse Google OAuth to spoof Google in DKIM replay attack (source)
- Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials (source)
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433) (source)
- Cookie-Bite attack PoC uses Chrome extension to steal session tokens (source)
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- Google: 97 zero-days exploited in 2024, over 50% in spyware attacks (source)