Edward Kiledjian's Threat Intel

New Phoenix attack bypasses Rowhammer defenses in DDR5 memory www.bleepingcomputer.com/news/secu…

Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix. A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read/write operations to cause enough electrical interference to alter the value of the nearby bits from one to zero and vice-versa (bit flipping).

An attacker could potentialluy corrupt data, increase their privileges on the system, execute malicious code, or gain access to sensitive data. One defense mechanism against Rowhammer attacks is called Target Row Refresh (TRR), which prevents bit flips by issuing an extra refresh command when detecting frequent accesses to a particular row.