GoFetch Vulnerability: Apple M1/M2 Chip Attack
Do Son, Security Online
Apple’s M1 and M2 chips have a reputation for being quite robust. Of late, there has been discovered a new vulnerability by the name of GoFetch that somewhat worries the user. This actually creates a possible danger to users, especially those who have strong encryption while protecting their valuable data.
What is the GoFetch Vulnerability?
GoFetch is a class of attack that leverages a feature in the M1 and M2 chips known as Data Memory-dependent Prefetchers, or DMPs for short. The DMP basically speeds things up by prefetching data that might subsequently be used by the processor. But what the researchers discovered was that malicious apps could actually trick the DMP into leaking valuable information-such as cryptographic keys-from targeted processes.
Here’s a simplified breakdown:
A real application performs cryptographic operations and maintains sensitive information such as encryption keys. An evil application running on that OS exploits the DMP feature. The malicious application keeps performing the specific actions that manipulate the DMP so as to continue leaking bits of information from the real application’s memory.
Eventually, the attacker may be able to assemble the full secret key.
Why is GoFetch worrisome?
The biggest concern with GoFetch is that it’s hardware-based. Unlike software-level issues, which can normally be patched up through updates, GoFetch is a flaw in the M1 and M2 chip design. A permanent solution involves revising the hardware for Apple processors going forward.
What makes GoFetch especially concerning is this: It aims at sensitive information:
GoFetch searches for cryptographic keys used in encryption, which may compromise the security of passwords and any other crucial information.
Difficult to Mitigate: Since it’s a hardware vulnerability, a complete fix requires new chip designs. Current mitigation options might involve software workarounds impacting performance, especially for cryptographic functions.
What Can You Do?
But as long as the vulnerability exists, there’s no need to panic. Here are some few things you may do to stay vigilant:
Keep Up to Date: Allow your Mac software to be updated regularly with Apple’s latest security updates, since they might contain some fixes to reduce the probability of an attack.
Software Beware: Refrain from installing or running any non-trusted applications. Download software from trusted sources, being observant to avoid unknown programs that may steal sensitive information.
Consider Hardware Encryption: Hardware encryption keys, like the T2 Security Chip by Apple, could further protect such vital information in a scenario where one would have lost such software keys.
Stay current: This vulnerability is still under development since researchers are seeking more details and means to fix the weakness. Stay abreast by following reputed security news sources for the latest information.
Sources:
GoFetch Vulnerability Website: https://medium.com/macoclock/gofetch-security-flaw-unfixable-threat-to-apple-m1-and-m2-processors-e5a36ac5db57
TechRepublic: https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/2/
The Mac Security Blog (Intego): https://gofetch.fail/
Security Online: https://securityonline.info/gofetch-attack-unlocks-encrypted-data-putting-apple-and-intel-users-at-risk/