New Rowhammer Attack Bypasses Previous Mitigations
Security researchers discovered a variation of the Rowhammer attack – the exploitation of a flaw within dynamic random-access memory (DRAM) – in which a threat actor overloads DRAM memory cell rows with read-write operations, causing the cells to change their electrical charge and alter the information stored in the computer’s memory. Threat actors could use this tactic to deliver malicious code that can alter operating system behavior, escalate privileges, root devices, or cause a denial-of-service condition. Researchers discovered that, by narrowing down the Rowhammer data to only one line of memory cells, they could bypass previously successful prevention strategies. The NJCCIC recommends users and administrators review the multi-authored research paper “Another Flip in the Wall of Rowhammer Defenses” for additional attack vector details and mitigation recommendations.