TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Real-World Breaches from Speculative Execution Vulns?

23 pointsby PhantomPhreakabout 3 years ago
For years we’ve been reading about how vulnerable so many computer systems, especially ones using Intel and AMD processors, are highly vulnerable to speculative execution attacks such as Spectre, Meltdown, Foreshadow and Fallout. Numerous demonstrations of the feasibility of these attacks have been published, seemingly showing their practicality (even in JavaScript). Microcode updates that partially mitigate them have meant significant performance slowdowns, also suggesting their practicality. Are there many cases where these vulnerabilities have led to actual security breaches of real-world systems?

4 comments

gargletoneabout 3 years ago
No, for two reasons. First is that software vulnerabilities are so much more prevalent that in the real world, it would be a wasted effort to attempt to exploit these hardware side-channel vulnerabilities. There&#x27;s much lower-hanging fruit elsewhere.<p>Second is that for the most vulnerable attack scenarios, they were mitigated long before the public release of Spectre and Meltdown. The big one was cloud computing - attackers being able to exfiltrate data from VMs running on the same host. Microsoft, Amazon and Google had many months in which to roll out updates to their infrastructure that enhanced VM isolation. Similar for browser vendors, for example Chromium introducing Site Isolation. And operating system developers - mitigations for Windows kernel and Linux were being tested for months before public disclosure.
layer8about 3 years ago
I don’t think so. Probably because it’s still much easier to get users to install ransomware by phishing or by disseminating USB sticks.
gwdabout 3 years ago
Keep in mind that &quot;breach&quot; here is limited to an <i>information leak</i>. Passwords could be read to achieve a privilege escalation; but a more likely attack would be stealing private keys or other sensitive information. The latter would leave no trace on the target system. So how would you know if your private keys or passwords had been stolen?
评论 #30747253 未加载
jedisct1about 3 years ago
Presumably, some malware have been trying to exploit this: <a href="https:&#x2F;&#x2F;www.techrepublic.com&#x2F;article&#x2F;spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.techrepublic.com&#x2F;article&#x2F;spectre-and-meltdown-fl...</a><p>I&#x27;ve never seen them in the wild.