The team at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have discovered a way to attack the pointer authentication in Apple’s M1 chip to execute arbitrary code on Macintosh systems.
The team says that the vulnerability is found in other ARM chips, not just the M1 – but it hasn’t yet had the chance to try it against the M2.
In order to get a little closer to this attack and what is the main characteristic and basis of the attack, we have to mention the PAC itself.
Pointer Authentication is a security feature that adds a cryptographic signature to operating system pointers, named Pointer Authentication Code (PAC). This allows the OS to spot and block unexpected changes that may lead to data leaks.
Chapters
---------------
00:00 - Summary Of The Attack
01:00 - What Is The M1 Chip Vulnerability?
01:33 - How Does The M1 Chip Attack Work?
02:16 - PACMAN Vs. M1
04:17 - Apples' Respons & Mitigation Steps
About Our Expert
----------------------------
Dalibor Gašić
[ Ссылка ]
Resources
------------------
► Recent Data Breaches: [ Ссылка ]
► PurpleSec’s Cyber Security Maturity Model: [ Ссылка ]
► Build A Vulnerability Management Program: [ Ссылка ]
Sources
-------------
► [ Ссылка ]
► [ Ссылка ]
► [ Ссылка ]
Related Videos
------------------------
► Hertzbleed Attacking Intel & AMD CPUs: [ Ссылка ]
► Cleartrip's Massive Data Breach: [ Ссылка ]
► Maui Ransomware Attack: [ Ссылка ]
► Conti Ransomware Attack: [ Ссылка ]
► Kaseya Ransomware Attack: [ Ссылка ]
► Saudi Aramco $50 Million Data Breach: [ Ссылка ]
#Apple #M1 #CyberAttack
Ещё видео!