Worrying: a large number of malware emerged after the release of Intel chip vulnerability PoC, worrying about poc
Recently, security researchers found that more and more malware samples on the market are trying to develop variants using Intel's previously exposed CPU Security Vulnerabilities (Meltdown and Spectre. According to a survey by experts from many foreign security companies, 119 samples of PoC code have been found using Meltdown and Spectre security vulnerabilities.
This happened shortly after the PoC code for Meltdown and Spectre security vulnerabilities was released, researchers found some malware samples related to the vulnerability, these samples directly contain PoC code or variants. It can be said that the announcement of the PoC started a new wave of malware. However, most of the samples are currently being tested by security researchers on the PoC code and cannot be ruled out by the authors of malware whose PoC code is to be weapon out.
The emergence of a large number of PoC samples has aroused the concern of security researchers, which means that malicious software authors are using the results of the code, but cannot determine what their purpose is. Meltdown and Spectre are all very serious security vulnerabilities. Once exploited, attackers can intrude into the system and obtain a large amount of information from the kernel memory space and other applications, attackers can exploit these vulnerabilities remotely by embedding attack code into webpages and passing common JavaScript files.
Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5715, CVE-2017-5753) related security vulnerabilities have a corresponding solution, there is a need for users to operate in security software, in addition to this, most people think that these two security vulnerabilities may first appear in the malicious software combination of national support attackers, and then in other vulnerabilities or tools and spam.