Jump to content

How much should an individual worry about Zombieload?

Fasauceome

I've been looking into things like Spectre and meltdown, and now Zombieload, and I understand how the vulnerabilities manifest themselves and the damage they do, but one thing is very hard to discern. How does this affect my computer? Or more specifically, how do I catch this "virus?" Do I need to download and run a malicious program, like a Trojan, or can it run on a random webpage and ignore antivirus, or does someone need administrator access like with Ryzen Fall?

 

Are there simple, safe habits I can use to avoid these vulnerabilities, like any other virus?

I WILL find your ITX build thread, and I WILL recommend the SIlverstone Sugo SG13B

 

Primary PC:

i7 8086k - EVGA Z370 Classified K - G.Skill Trident Z RGB - WD SN750 - Jedi Order Titan Xp - Hyper 212 Black (with RGB Riing flair) - EVGA G3 650W - dual booting Windows 10 and Linux - Black and green theme, Razer brainwashed me.

Draws 400 watts under max load, for reference.

 

How many watts do I needATX 3.0 & PCIe 5.0 spec, PSU misconceptions, protections explainedgroup reg is bad

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, fasauceome said:

I've been looking into things like Spectre and meltdown, and now Zombieload, and I understand how the vulnerabilities manifest themselves and the damage they do, but one thing is very hard to discern. How does this affect my computer? Or more specifically, how do I catch this "virus?" Do I need to download and run a malicious program, like a Trojan, or can it run on a random webpage and ignore antivirus, or does someone need administrator access like with Ryzen Fall?

From what I've read Zombieload can be triggered from javascript stuff on webpages as well as local programs.

 

Administrator access is definitely not required. Viewing an infected website seems to be all it takes.

 

Intel and the CVE Organization (that's not the actual name of the organization but I don't know the actual name) have determined that this class of vulnerability is ranked as "medium" severity which means really bad but it means there is the potential for worse stuff.

 

All this means that you do need to apply all possible mitigations and if your CPU isn't being supported such as the X58 platform then it's probably worth no longer connecting it to the internet.

10 minutes ago, fasauceome said:

Are there simple, safe habits I can use to avoid these vulnerabilities, like any other virus?

Updating your OS and firmware (there's a Micro-code update being rolled out through the usual channels such as Windows update for windows users).

 

Some experts believe completely disabling Hyper Threading is the only real way to be safe. Google has taken the hard stance to disable HT on their platforms.

 

If you've got an affected CPU which has Hyper Threading then it's probably worthwhile disabling Hyper Threading.

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, AluminiumTech said:

Some experts believe completely disabling Hyper Threading is the only real way to be safe. Google has taken the hard stance to disable HT on their platforms.

 

If you've got an affected CPU which has Hyper Threading then it's probably worthwhile disabling Hyper Threading.

Jay just did a video on disabling the hyperthreading.  Apparently if you are just gaming it doesn't make a huge difference.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

For regular consumers the risk seems to be minimal.  For datacenters it's a huge issue because one user could be running malicious code on the server to read what's happening in another user's process. 

 

IF Spectre, Meltdown and Zombieload ever become real-life threats, for you as a regular user it would mean that your machine would have to get infected by malware containing those exploits in order for the exploits to do their thing.  If you get any kind of malware on your system you're screwed anyway.

 

EDIT : Actually it looks like Zombieload can be done through the browser as well, no need to install any malware.  But as long as we don't see it being done in the real world I still wouldn't worry too much. 

Link to comment
Share on other sites

Link to post
Share on other sites

My take: Don't panic!

 

Keep up with Windows Updates. If available, get bios updates with new microcode, but it is possible for Windows to load microcode too although it isn't very clear if or when they do. Keep separate backups of important data, which you should do regardless.

 

These attacks are not in themselves that significant unless you make money from FUD like AV companies. The danger comes if multiple exploits are used in combination to gain control of your system. It's like a difference between sniffing data, and using that data to form an attack. The more opportunities you close, the less likely a successful attack will be.

Main system: i9-7980XE, Asus X299 TUF mark 2, Noctua D15, Corsair Vengeance Pro 3200 3x 16GB 2R, RTX 3070, NZXT E850, GameMax Abyss, Samsung 980 Pro 2TB, Acer Predator XB241YU 24" 1440p 144Hz G-Sync + HP LP2475w 24" 1200p 60Hz wide gamut
Gaming laptop: Lenovo Legion 5, 5800H, RTX 3070, Kingston DDR4 3200C22 2x16GB 2Rx8, Kingston Fury Renegade 1TB + Crucial P1 1TB SSD, 165 Hz IPS 1080p G-Sync Compatible

Link to comment
Share on other sites

Link to post
Share on other sites

Not very. There has been no evidence of it being used in the wild and buy the time someone figures it out it's going to have all mitigations in place

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Arika S said:

Not very. There has been no evidence of it being used in the wild and buy the time someone figures it out it's going to have all mitigations in place

It's just hard to find out what the attack vectors are, since the articles (rightly) assume most people reading are using their browser raw no rubber, with little consideration in mind 

I WILL find your ITX build thread, and I WILL recommend the SIlverstone Sugo SG13B

 

Primary PC:

i7 8086k - EVGA Z370 Classified K - G.Skill Trident Z RGB - WD SN750 - Jedi Order Titan Xp - Hyper 212 Black (with RGB Riing flair) - EVGA G3 650W - dual booting Windows 10 and Linux - Black and green theme, Razer brainwashed me.

Draws 400 watts under max load, for reference.

 

How many watts do I needATX 3.0 & PCIe 5.0 spec, PSU misconceptions, protections explainedgroup reg is bad

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, fasauceome said:

 browser raw no rubber

+1

Workstation Laptop: Dell Precision 7540, Xeon E-2276M, 32gb DDR4, Quadro T2000 GPU, 4k display

Wifes Rig: ASRock B550m Riptide, Ryzen 5 5600X, Sapphire Nitro+ RX 6700 XT, 16gb (2x8) 3600mhz V-Color Skywalker RAM, ARESGAME AGS 850w PSU, 1tb WD Black SN750, 500gb Crucial m.2, DIYPC MA01-G case

My Rig: ASRock B450m Pro4, Ryzen 5 3600, ARESGAME River 5 CPU cooler, EVGA RTX 2060 KO, 16gb (2x8) 3600mhz TeamGroup T-Force RAM, ARESGAME AGV750w PSU, 1tb WD Black SN750 NVMe Win 10 boot drive, 3tb Hitachi 7200 RPM HDD, Fractal Design Focus G Mini custom painted.  

NVIDIA GeForce RTX 2060 video card benchmark result - AMD Ryzen 5 3600,ASRock B450M Pro4 (3dmark.com)

Daughter 1 Rig: ASrock B450 Pro4, Ryzen 7 1700 @ 4.2ghz all core 1.4vCore, AMD R9 Fury X w/ Swiftech KOMODO waterblock, Custom Loop 2x240mm + 1x120mm radiators in push/pull 16gb (2x8) Patriot Viper CL14 2666mhz RAM, Corsair HX850 PSU, 250gb Samsun 960 EVO NVMe Win 10 boot drive, 500gb Samsung 840 EVO SSD, 512GB TeamGroup MP30 M.2 SATA III SSD, SuperTalent 512gb SATA III SSD, CoolerMaster HAF XM Case. 

https://www.3dmark.com/3dm/37004594?

Daughter 2 Rig: ASUS B350-PRIME ATX, Ryzen 7 1700, Sapphire Nitro+ R9 Fury Tri-X, 16gb (2x8) 3200mhz V-Color Skywalker, ANTEC Earthwatts 750w PSU, MasterLiquid Lite 120 AIO cooler in Push/Pull config as rear exhaust, 250gb Samsung 850 Evo SSD, Patriot Burst 240gb SSD, Cougar MX330-X Case

 

Link to comment
Share on other sites

Link to post
Share on other sites

What the average user should do, is join Team Red - yeah that's the real answer!  Or take your CPU and neuter it ;)  I have nothing relevant to add to this topic, other than stealing the description "browser raw no rubber"

Workstation Laptop: Dell Precision 7540, Xeon E-2276M, 32gb DDR4, Quadro T2000 GPU, 4k display

Wifes Rig: ASRock B550m Riptide, Ryzen 5 5600X, Sapphire Nitro+ RX 6700 XT, 16gb (2x8) 3600mhz V-Color Skywalker RAM, ARESGAME AGS 850w PSU, 1tb WD Black SN750, 500gb Crucial m.2, DIYPC MA01-G case

My Rig: ASRock B450m Pro4, Ryzen 5 3600, ARESGAME River 5 CPU cooler, EVGA RTX 2060 KO, 16gb (2x8) 3600mhz TeamGroup T-Force RAM, ARESGAME AGV750w PSU, 1tb WD Black SN750 NVMe Win 10 boot drive, 3tb Hitachi 7200 RPM HDD, Fractal Design Focus G Mini custom painted.  

NVIDIA GeForce RTX 2060 video card benchmark result - AMD Ryzen 5 3600,ASRock B450M Pro4 (3dmark.com)

Daughter 1 Rig: ASrock B450 Pro4, Ryzen 7 1700 @ 4.2ghz all core 1.4vCore, AMD R9 Fury X w/ Swiftech KOMODO waterblock, Custom Loop 2x240mm + 1x120mm radiators in push/pull 16gb (2x8) Patriot Viper CL14 2666mhz RAM, Corsair HX850 PSU, 250gb Samsun 960 EVO NVMe Win 10 boot drive, 500gb Samsung 840 EVO SSD, 512GB TeamGroup MP30 M.2 SATA III SSD, SuperTalent 512gb SATA III SSD, CoolerMaster HAF XM Case. 

https://www.3dmark.com/3dm/37004594?

Daughter 2 Rig: ASUS B350-PRIME ATX, Ryzen 7 1700, Sapphire Nitro+ R9 Fury Tri-X, 16gb (2x8) 3200mhz V-Color Skywalker, ANTEC Earthwatts 750w PSU, MasterLiquid Lite 120 AIO cooler in Push/Pull config as rear exhaust, 250gb Samsung 850 Evo SSD, Patriot Burst 240gb SSD, Cougar MX330-X Case

 

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, fasauceome said:

It's just hard to find out what the attack vectors are

According to Intel and the security researchers that found it, it's not a simple thing to exploit, but it's mostly mitigated by not downloading dodgy shit and using something like a script blocker on your browser plus all the updates that will be coming soon.

 

Quote

What the average user should do, is join Team Red

i wonder how many people have non-HT CPUs (like my i5) that are freaking the fuck out over something that doesn't actually affect them. 

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Worstcaster said:

snip

That will depend on the game and also depending on the number of cores and threads a CPU has.

 

I expect a 2C/4T and 4C/8T CPU to be hit worse than the 6C/12T and 8C/16T CPUs.

38 minutes ago, fasauceome said:

It's just hard to find out what the attack vectors are, since the articles (rightly) assume most people reading are using their browser raw no rubber, with little consideration in mind 

From what I can gather the other attack vector is running a malicious program or a virus which takes advantage of this type of vulnerability..

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, ReggieGRS said:

My bad if this sounds dumb but VPN doesn't help at all against that i'm assuming?

nope. any malicious scripts still interact directly with the CPU regardless of which servers you hopped through to access the infected website

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

It's hard to quantify exactly how much someone should worry about something.

But my take on it is that you should worry about it less than you worry about heart disease, and more than you worry about being molested by Bigfoot.

Somewhere in that kind of range.

Link to comment
Share on other sites

Link to post
Share on other sites

12 minutes ago, DezGalbie said:

more than you worry about being molested by Bigfoot.

I live right next to a wooded area, maybe I worry more than you think

I WILL find your ITX build thread, and I WILL recommend the SIlverstone Sugo SG13B

 

Primary PC:

i7 8086k - EVGA Z370 Classified K - G.Skill Trident Z RGB - WD SN750 - Jedi Order Titan Xp - Hyper 212 Black (with RGB Riing flair) - EVGA G3 650W - dual booting Windows 10 and Linux - Black and green theme, Razer brainwashed me.

Draws 400 watts under max load, for reference.

 

How many watts do I needATX 3.0 & PCIe 5.0 spec, PSU misconceptions, protections explainedgroup reg is bad

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, AluminiumTech said:

 

 

All this means that you do need to apply all possible mitigations and if your CPU isn't being supported such as the X58 platform then it's probably worth no longer connecting it to the internet.

 

I've a laptop loaned out to my sister from 2010. Has an i5-560M in it (2C 4T), and hasn't recieved an update from the manufacturer since I got the thing. Reference graphics drivers had to be hacked in to run Windows 10, for one example. Certainly nothing in regards to BIOS updates. Don't really have anything else to loan her though. Big concern?

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Zodiark1593 said:

I've a laptop loaned out to my sister from 2010. Has an i5-560M in it (2C 4T), and hasn't recieved an update from the manufacturer since I got the thing. Reference graphics drivers had to be hacked in to run Windows 10, for one example. Certainly nothing in regards to BIOS updates. Don't really have anything else to loan her though. Big concern?

Oh yeah definitely.

 

Assuming there's no Meltdown or Spectre mitigations either then VERY BIG CONCERN. Otherwise just BIG CONCERN.

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, fasauceome said:

I've been looking into things like Spectre and meltdown, and now Zombieload, and I understand how the vulnerabilities manifest themselves and the damage they do, but one thing is very hard to discern. How does this affect my computer? Or more specifically, how do I catch this "virus?" Do I need to download and run a malicious program, like a Trojan, or can it run on a random webpage and ignore antivirus, or does someone need administrator access like with Ryzen Fall?

 

Are there simple, safe habits I can use to avoid these vulnerabilities, like any other virus?

It really depends.

Server:

Patch immediately. Especially if it's a cloud/vps/vm server. eg all Amazon AWS services. At this point all patches applied loses up to 20% of the CPU performance. So over-sold virtual servers are going to suffer, and this equates to a 20% loss in revenue. Turn HT off.

 

Games:

Patch immediately if the game client has user-editable client loadable code (eg HTML5 games, Unity, Cocos2D, RPG Maker MV, etc), turn HT off for all other games, patch or not.

 

Business:

Patch always. Turn HT off on machines that run or access user-editable script. 

 

In short, you should be looking for a BIOS patch if you have an Intel Haswell CPU or newer. (i7-4xxx, i5-4xxx, i3-4xxx, Pentium 3550, and Celeron 2xxx). 

 

Should you be worried? Not terribly. The major target will be anything that can run node.js (servers), nw.js (node webkit, used by most HTML5 games in stand-alone mode) , CEF (Chromium Embeddable Framework) used by applications (eg MMO launchers, Spotify, Adobe software, etc) , Electron (used by Slack, Whatsapp), and such. 

 

Any "virus" like activity will likely be targeting servers however. It's not efficient to use these exploits to get data, so you have to know what you're trying to get in the first place, and the target would likely be something you have to login to, that also runs arbitrary script (eg ads.)

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, AluminiumTech said:

Oh yeah definitely.

 

Assuming there's no Meltdown or Spectre mitigations either then VERY BIG CONCERN. Otherwise just BIG CONCERN.

I don't plan to take it out of commission as of now since, performance-wise, the thing is quite speedy for net surfing and brute forces YouTube's VP9 1080P pretty well. Updates have been made as best as possible though between Windows (actually further along than my desktop as the laptop has good internet) and the browsers.

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, Kisai said:

 

 

Games:

Patch immediately if the game client has user-editable client loadable code (eg HTML5 games, Unity, Cocos2D, RPG Maker MV, etc), turn HT off for all other games, patch or not.

 

For a number of very demanding games, losing HT can be a pretty grevious performance hit for quad core users.

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Zodiark1593 said:

For a number of very demanding games, losing HT can be a pretty grevious performance hit for quad core users.

Not really. Usually you get more out of turning HT off unless the game uses DX12/Vulkan with a multithreaded renderer. DX9 games are capped to the performance of the fastest cpu core, and you're usually better of forcing it not to run on the HT core.

 

Regardless, HT's performance is basically a way to take advantage of sloppy multi-process (eg pre-fork model, or the "tabs" in all current browsers) programming rather than encourage threading. That is why HT is dangerous for the web browser if exploitable. This is why WASM (WebAssembly) should be turned off by default.

 

3 minutes ago, ReggieGRS said:

Is it true Zombieload only affects Kaby Lake and older?

Are 9900K owners safe from this?

It only affects Intel chips with HT turned on, 8th and 9th generation chips may be immune. https://mdsattacks.com/ , test it yourself.

 

https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html

 

The big thing is that once the vulnerability is proven and in the wild, you never know how it will be exploited.

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Kisai said:

Not really. Usually you get more out of turning HT off unless the game uses DX12/Vulkan with a multithreaded renderer. DX9 games are capped to the performance of the fastest cpu core, and you're usually better of forcing it not to run on the HT core.

 

Regardless, HT's performance is basically a way to take advantage of sloppy multi-process (eg pre-fork model, or the "tabs" in all current browsers) programming rather than encourage threading. That is why HT is dangerous for the web browser if exploitable. This is why WASM (WebAssembly) should be turned off by default.

 

 

 

Where SMT is used (Hyperthreading is SMT) the "HT cores" are treated as equal class citizens to the "Real cores". Whether the task is being performed on the "HT" or "Real" core is irrelevant so long as the load on the cores (the physical ones) are being managed accordingly. Windows is able to differentiate which threads belong to which core, so you won't usually see the issue of running your main game thread on the same core that's handling your video encode.

 

In a highly controlled environment where code is written as closely to ideal as possible and little or no external code is allowed to run, SMT, and even OoO excecution would not be necessary to extract as much performance as possible from the cpu. Modern CPUs are wide and deep enough that it is quite difficult to keep all of the pipelines fully occupied at all times. The role of SMT is to allow another, entirely different task to take advantage of unused cpu resources without the overhead of flushing the internal caches and registers, resulting in greater overall throughput from the one cpu core, albeit, with a consequence to security, varying with implementation.

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

is the HT i3 the main target? business pc tends to be low end with important data.

and if you disable HT you will just have 2 core left~

Link to comment
Share on other sites

Link to post
Share on other sites

Meh. I like AMD as much as the next guy but most of the freaking out about it is really fucking pointless. Unless you're actively gong on sites with malicious code (or run a server), there's not too much to really worry about.

Check out my guide on how to scan cover art here!

Local asshole and 6th generation console enthusiast.

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, Dan Castellaneta said:

Unless you're actively gong on sites with malicious code

That's potentially every site running Google Adsense.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, Drak3 said:

That's potentially every site running Google Adsense.

adblockers and script blockers are basically a necessity these days 

🌲🌲🌲

 

 

 

◒ ◒ 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×