Appeared worm computer attack AMD processor chip
Symantec's security researchers have discovered a computer worm that can directly attack AMD processors, instead of attacking Windows operating systems.
With two different versions, the newly discovered computer worm - named Symantec named w32.bounds and w64.bounds - is capable of attacking both 32-bit and 64-bit versions of AMD.
However, according to experts, these are just destructive codes that are proven to be capable of attacking AMD chips rather than a complete worm, so the level of security threats is not high.
" Although it is only the code that is not harmful yet, it can completely be the original platform to create other malicious software to attack PC systems despite that PC is running this type of system. ", Mr. Vincent Weafer, director of Symantec Security Response Group warned.
Highest control
' If I can gain access to the processor level, I will become the boss. I can completely remove some kernel-based or user-protected solutions. Virus programmers always want to gain as deep access as possible on the victim's system , 'Weafer said.
' Once the aforementioned worm operates right in the processor, I will get access to the deepest level of the system. I can absolutely do anything I want , 'Weafer said.
However, each of the different processor types uses a different type of Operating Code (opcode). So the ability to attack a wide range of newly discovered computer worms seems to be greatly limited.
' Usually, the access to optcode access is often not very effective because the microprocessor market has many different opcode types applied. This worm will be hard to infect many PC systems , 'said Weafer.
Logically, the next step on the development path of the computer worm is to combine both 32-bit and 64-bit versions to form a single type of malware that attacks the lines. AMD chip.
This solution, the director of Symantec Security Response Group stressed, is easier to apply to AMD's product lines than Intel's because the two 32-bit and 64-bit chips of AMD are relatively similar. , while Intel products do not.
Potential risks
' The author's primary motivation for this computer worm is to provide a realistic demonstration: The code that attacks the processor can completely harm and bypass every detected technology if it is infects multi-core processor streams. He wants to prove his technical talent. But this technique cannot be used to create widespread computer virus pandemics. This technique can only be used in attacks with really clear objectives or theoretical attacks , 'said Weafer.
Two versions of w32.bounds and w64.bounds both infect the system by writing to Windows self-executing files. Therefore, these worms have only been proven to be capable of attacking microprocessors and cannot be called microprocessor-level security threats. However, the worm also has the expression of a security threat of this type thanks to its ability to execute some code at the processing level.
History of the world security industry has witnessed the explosion of a microprocessor-level security threat in 1998. CIH / Chernobyl appears and embeds itself into the BIOS of millions of computer systems in 13th anniversary of the Chernobyl nuclear disaster. The goal of this malicious software is to remove all data. It is estimated that the total damage caused by CIH / Chernobyl has reached 250 million USD. This type of malware originated in Korea.
Today, the risk of processor-level security is quite rare. Viruses that attack the operating system are easier to program and develop. The most obvious demonstration is the dominance of viruses that attack the Windows operating system.
Trang Dung
You should read it
- Deep new computer: unexpectedly simple?
- Mobler 'super devastating' computer worm is back!
- Will the Kama Sutra worm come back next week?
- There are worms to fake Microsoft patches again
- Conficker worm still silently grows
- Deep detection of USB memory card
- New worms spread via email provide fake links
- Deep Bagle-DO: 'I have nude photos of Paris Hilton'
May be interested
- The World Cup virus appeared againsecurity firm sophos has just warned football fans about a new worm that could steal their personal information. sophos said that w32 / zasran-a computer worms are distributed mainly through the computer
- New depths appear to attack Nokia phonessecurity firm fortinet has just warned of a toxic worm that attacks symbianos phones, but nokia is an example. the worm is called symbos / beselo.a! this worm spreads over mobile networks, capable of attacking
- Iran: The Stuxnet 'total attack' of industrial systemsiranian officials confirmed that the stuxnet worm infested at least 30,000 pcs running windows in the country ...
- Israel tested the Stuxnet computer worm to attack Iranthe new york times reported yesterday that the us and israel have cooperated to develop a computer worm that undermined iran's nuclear bomb efforts.
- Computer virus causes iPhone 2018 chip manufacturer to stop workingon friday night, a computer virus stopped taiwan semiconductor manufacturing co. (tsmc), the partner of the iphone 2018's main processor for apple.
- New IM worm ... chat with the victim himselffor the first time, a worm automatically chat with users via im programs, enticing them to click on a malicious link to attack the victim's computer.
- What is the CPU?cpu (central processing unit) is the central processor of the computer. the cpu processes all the commands it receives from hardware and software running on the computer.
- Passwords are simply 'fat bait' of Conficker wormaccording to microsoft's microsoft sirv12 security report, 92% of computers are infected with conficker worm because the password is too weak or stolen, and only 8% is due to unpatched vulnerabilities.
- TSMC is ready for the 5nm process, the first product will be the Apple A14 Bionic?taiwan chip manufacturer tsmc has spent many years researching, along with tireless investments to commercialize the superior 5nm chip manufacturing process.
- Samsung announced a 3nm process chip, saving more than 50% energy, 35% faster than 7nm chipthis new 3nm chip is based on the gate all around architecture, which helps bring chips smaller than 45% in size.