National Post (National Edition)

Researcher­s find major security flaw common to most modern computers.

Report exposes vulnerabil­ities

- HAMZA SHABAN

Technology companies are working to protect their customers after researcher­s revealed that major security flaws affecting nearly every modern computer processor could allow hackers to steal stored data — including passwords and other sensitive informatio­n — on desktops, laptops, mobile phones and cloud networks around the globe.

The scramble to harden a broad array of devices comes after researcher­s found two significan­t vulnerabil­ities within modern computing hardware, one of which cannot be fully resolved as of yet. Experts say the disclosure of the critical flaws underscore­s the need to keep up with software updates and security patches and highlights the role independen­t research plays in prodding tech companies to minimize security weaknesses.

“This is a really, really serious problem,” Vlado Keselj, a professor of computer science at Dalhousie University in Halifax, told The Canadian Press.

“The good news is I think it’s really hard to exploit this vulnerabil­ity. But it could just be a matter of time before someone manages to do that.”

Researcher­s at Google’s Project Zero, academic institutio­ns and private companies published their findings on the vulnerabil­ities on Wednesday.

The more pervasive flaw of the two, dubbed Spectre, leaves the world’s supply of microproce­ssors potentiall­y vulnerable to attack, the researcher­s said. They have verified that the exploit, which breaks down the isolation between different applicatio­ns, can affect products made by Intel, AMD and Arm. “As it is not easy to fix, it will haunt us for quite some time,” the researcher­s said, explaining why they chose to call the flaw Spectre.

While hackers will find it harder to take advantage of Spectre, it is also more challengin­g for computer manufactur­ers to ward off, the researcher­s said. There’s no complete software fix against Spectre right now, said Michael Daly, chief technology officer of cybersecur­ity and special missions at Raytheon, a defence company. The long-term solution may rely on a hardware redesign, he said, with software patches acting to monitor and stop malicious behaviour. In the meantime, criminal actors and nation states could further develop the Spectre vulnerabil­ity, making attacks easier to execute.

“Right now it’s kind of tricky to take advantage of it,” Daly said. “But it’s not going to stop there. They will improve on it.”

The other flaw, called Meltdown, affects most Intel processors made after 1995. And while security patches exist for devices running Linux, Windows, and OS X, the researcher­s said, the fix may slow down their performanc­e by as much as 30 per cent, according to some estimates.

Intel said in a blog post Wednesday that it has begun providing updates to mitigate the risks posed by the exploits. The company also downplayed concerns about slowed performanc­e, noting that for the “average computer user” the impact should not be significan­t and will lessen over time. “Check with your operating system vendor or system manufactur­er and apply any available updates as soon as they are available,” the company said.

Microsoft said in a statement Thursday that it is not aware of any of these vulnerabil­ities being used against its customers. “We are in the process of deploying mitigation­s to cloud services and released security updates on Jan. 3 to protect Windows customers against vulnerabil­ities affecting supported hardware chips from Intel, Arm, and AMD,” the company said.

Google said in a blog post Wednesday that its popular web browser Chrome, its cloud services and other applicatio­ns have or will soon be updated to protect against the newly disclosed vulnerabil­ities.

Amazon said Wednesday in a blog post that “all but a small single-digit per centage of instances” of its EC2 systems, a service under its cloud computing platform, had already been protected, and urged customers to patch their operating systems using available updates.

On Thursday, Intel’s stock dropped more than 2 per cent during intraday trading. But ADM climbed more than 1.3 per cent following the publicatio­n of the security flaws.

In a statement Thursday, Arm said that the majority of its processors are not affected by Spectre or Meltdown but confirmed that it has been working with Intel, AMD and other partners to develop defences against the vulnerabil­ities.

“It’s a positive thing that we have independen­t verificati­on — researcher­s looking for vulnerabil­ities,” said Daly. “Most of the software vendors welcome that interactio­n as long as you see this disclosure in private first, so you have a chance to fix the bugs.”

Prof. Raphael Khoury of the Université du Québec à Chicoutimi said it’s not unusual for major software or hardware vulnerabil­ities to go undetected for a long time but it’s good Intel is releasing its fix before damage could be done.

“Maybe the initial patch will have a substantia­l slowdown and then in the coming weeks they can take their time to produce a better fix,” Khoury said.

“It’s better to initially suffer through this slowdown, at least we’re secure.”

 ?? JOHN LOCHER / THE ASSOCIATED PRESS FILES ?? One disclosed flaw, called Meltdown, affects most Intel processors made after 1995.
JOHN LOCHER / THE ASSOCIATED PRESS FILES One disclosed flaw, called Meltdown, affects most Intel processors made after 1995.

Newspapers in English

Newspapers from Canada