Close Menu
Crypto Chain Post
    Trending

    Coinbase CEO Says Crypto Integration Could Be ’10x Unlock’ for AI

    July 11, 2025

    BONK Advances 5% in V-Shaped Recovery as Bulls Eye Breakout

    July 11, 2025

    Bitcoin Liquidations Surge as BTC Breaks $118,000

    July 11, 2025

    How to earn Bitcoin with a Lightning node in 2025: Setup, strategies and income.

    July 11, 2025

    Linda Yaccarino Exits X, But It’s Not Clear Why

    July 11, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Friday, July 11
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » New Vulnerability in Apple MacBook Allows Hackers to Steal Cryptos
    Analysis

    New Vulnerability in Apple MacBook Allows Hackers to Steal Cryptos

    News RoomBy News RoomMarch 23, 2024No Comments3 Mins Read

    In a recent academic breakthrough, researchers have exposed a severe vulnerability within Apple’s M-series chips, primarily affecting the security of crypto assets.

    This flaw, detailed in a publication by scholars from prestigious institutions, enables attackers to access secret keys during cryptographic operations.

    How MacBooks Are Vulnerable to Crypto Hacks

    The issue is deeply ingrained in the microarchitecture of Apple’s M1 and M2 chips. Consequently, a direct patch is impossible. Instead, mitigation requires adjustments in third-party cryptographic software, potentially compromising performance.

    At the heart of this vulnerability is the data memory-dependent prefetcher (DMP) in these chips. This feature aims to predict and pre-load data, thus minimizing CPU and memory latency.

    However, the DMP’s unique behavior can mistakenly interpret memory content as pointer addresses, leading to unintended data leakage through side channels.

    Experts like Boru Chen from the University of Illinois Urbana-Champaign and Yingchen Wang from the University of Texas at Austin explain that attackers can exploit this prefetcher’s behavior. They achieve this by crafting inputs that the DMP erroneously recognizes as addresses, thus indirectly leaking encryption keys. This process is central to the newly identified GoFetch attack.

    Read more: Crypto Project Security: A Guide to Early Threat Detection

    “Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate,” the researchers explained.

    Remarkably, GoFetch does not require root access to execute. It operates with standard user privileges on macOS systems.

    The attack has proven effective against both conventional and quantum-resistant encryption methods, extracting keys within a timeframe that varies by cryptographic protocol.

    Facing this threat, developers must navigate the complexity. They need to implement robust defenses that, while effective, could significantly slow down processor performance during cryptographic tasks.

    One such mitigation tactic, ciphertext blinding, though potent, could require much more computational power, particularly affecting specific key exchanges.

    This GoFetch vulnerability revelation is part of a broader context of increasing digital threats, especially for crypto holders. Recent disclosures have pointed to significant security gaps in iOS and macOS, exploited for crypto scams.

    Read more: 9 Crypto Wallet Security Tips To Safeguard Your Assets

    Institutions like the National Institute of Standards and Technology and cybersecurity experts have highlighted the vulnerabilities in widely used apps and operating systems, advocating for heightened user caution and prompt system updates.

    Read the full article here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related News

    BONK Advances 5% in V-Shaped Recovery as Bulls Eye Breakout

    July 11, 2025

    Binance Coin (BNB) Price Prediction for July 10

    July 11, 2025

    Hayden Davis sent millions in crypto weeks before LIBRA promo

    July 11, 2025

    HBAR Price Hits 1-Month High, Targets 150% Rally As Hedera Network Activity Soars

    July 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    BONK Advances 5% in V-Shaped Recovery as Bulls Eye Breakout

    July 11, 2025

    Bitcoin Liquidations Surge as BTC Breaks $118,000

    July 11, 2025

    How to earn Bitcoin with a Lightning node in 2025: Setup, strategies and income.

    July 11, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.