iLeakage flaw could force iPhones and Macs to divulge passwords (2024)

A vulnerability in A-series and M-series chips could force iPhones, Macs, and iPads to divulge passwords and other sensitive information to an attacker. Security researchers have dubbed the flaw – which affects Safari on the Mac, and any browser on iOS devices – iLeakage.

In a proof of concept attack, researchers were able to obtain access to the contents of a Gmail inbox, YouTube history, and passwords auto-filled by Safari …

iLeakage flaw

Arstechnica outlines how the attack works.

The researchers implement iLeakage as a website. When visited by a vulnerable macOS or iOS device, the website uses JavaScript to surreptitiously open a separate website of the attacker’s choice and recover site content rendered in a pop-up window. The researchers have successfully leveraged iLeakage to recover YouTube viewing history, the content of a Gmail inbox—when a target is logged in—and a password as it’s being autofilled by a credential manager. Once visited, the iLeakage site requires about five minutes to profile the target machine and, on average, roughly another 30 seconds to extract a 512-bit secret, such as a 64-character string.

“We show how an attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution,” the researchers wrote on aninformational website. “In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content. Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.”

Variant of Spectre and Meltdown

The exploit is essentially a variant of the Spectre and Meltdown chip flaws discovered back in 2018, relating to a processing feature known as speculative execution.

Both were able to recover confidential information by exploring a newly discovered side channel in a performance-enhancing feature known as speculative execution, which is built into virtually all modern CPUs. Moving data from main system memory to a CPU is time consuming. To reduce wait times, modern CPUs execute instructions as soon as the required data becomes available rather than in a sequential order.

A key ingredient in this out-of-order paradigm is predicting paths the CPU is likely to go down. When the prediction turns out to be correct, the task is completed faster than it would have been otherwise. When it’s not, the CPU will abandon the mispredicted path and follow a new, correct path. While CPUs can reverse most of the effects, the Spectre and Meltdown researchers discovered that certain artifacts at a microarchitectural level, including cache and predictor states, couldn’t be restored. The insight allowed the researchers to devise attacks that tricked Intel and AMD CPUs into mispredicting sensitive instructions that spilled secrets from one app into a separate, unrelated app, a serious breach of a core security boundary.

In the years since, CPU and software makers have come up with a host of methods to mitigate speculative execution attacks. A key mitigation has been to limit the ability of a browser or other app from being able to measure the precise time a CPU takes to perform a certain operation. In browsers, more mitigations come in the form of defenses known as compressed 35-bit addressing and value poisoning.

iLeakage manages to overcome the protections introduced to combat Spectre and Meltdown.

Real-life risk low

There’s good news and bad news about the flaw.

The bad news is that any attacker exploiting this flaw can force your device to visit any website in the background, and capture data from that session. Even if you spot and close the popup window, the attack can still silently continue. The attack also requires minimal resources to actually carry out.

The reason I’ve emphasized those four words is because of the good news: This is a highly sophisticated attack vector which requires an extremely high level of expertise to exploit.

The biggest challenge—and it’s considerable—is the high caliber of technical expertise required. An attacker needs to not only have years of experience exploiting speculative execution vulnerabilities in general but also have fully reverse-engineered A- and M-series chips to gain insights into the side channel they contain. There’s no indication that this vulnerability has ever been discovered before, let alone actively exploited in the wild.

It’s expected that Apple will be able to patch the flaw before attackers are able to replicate the work carried out by the security researchers to discover how to exploit it. Indeed, the fact that they have chosen to share as much information as they have in advance of a patch is a sign of that confidence.

FTC: We use income earning auto affiliate links. More.

iLeakage flaw could force iPhones and Macs to divulge passwords (1)

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

iLeakage flaw could force iPhones and Macs to divulge passwords (2024)
Top Articles
California Roll Sushi Bowl Recipe - Cooking Classy
Meat Broth Recipe | Low Histamine Bone Broth Alternative – Mast Cell 360
The Tribes and Castes of the Central Provinces of India, Volume 3
UPS Paketshop: Filialen & Standorte
jazmen00 x & jazmen00 mega| Discover
Using GPT for translation: How to get the best outcomes
Odawa Hypixel
Top Scorers Transfermarkt
Geodis Logistic Joliet/Topco
According To The Wall Street Journal Weegy
Hallowed Sepulchre Instances & More
Weather Annapolis 10 Day
The Wicked Lady | Rotten Tomatoes
Driving Directions To Atlanta
Echo & the Bunnymen - Lips Like Sugar Lyrics
Gmail Psu
Cbs Trade Value Chart Fantasy Football
Slope Tyrones Unblocked Games
Extra Virgin Coconut Oil Walmart
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Adam4Adam Discount Codes
Ally Joann
Libinick
Maxpreps Field Hockey
Spn 520211
Like Some Annoyed Drivers Wsj Crossword
A Person That Creates Movie Basis Figgerits
Xfinity Outage Map Fredericksburg Va
Greensboro sit-in (1960) | History, Summary, Impact, & Facts
Mdt Bus Tracker 27
Jailfunds Send Message
Bfri Forum
Craigslist Cars And Trucks Mcallen
Quality Tire Denver City Texas
Zero Sievert Coop
拿到绿卡后一亩三分地
Myql Loan Login
Plead Irksomely Crossword
Saybyebugs At Walmart
Miracle Shoes Ff6
St Anthony Hospital Crown Point Visiting Hours
Unveiling Gali_gool Leaks: Discoveries And Insights
Content Page
Senior Houses For Sale Near Me
Az Unblocked Games: Complete with ease | airSlate SignNow
Autozone Battery Hold Down
Sherwin Source Intranet
Verizon Forum Gac Family
Bellelement.com Review: Real Store or A Scam? Read This
About us | DELTA Fiber
Walmart Front Door Wreaths
Morgan State University Receives $20.9 Million NIH/NIMHD Grant to Expand Groundbreaking Research on Urban Health Disparities
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 5917

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.