I've been watching this since December of last year but I've become really suspicious about the announcements of these cpu flaws and leveraged attacks. Because of one missing piece in all these stories and white papers.
There is no attack vector description in any of the published ones I've seen so far. They seem to just miraculously appear and attack these systems from nowhere or that's how it's described. As far as I understand you have to have a means to inject code to be subjected to it's effects and I have yet to find an example of how this malicious code get's into a machine to begin with. Even the variant that supposedly can attack through a browser is suspect because I have yet to find a working example or story of such an attack so far even to demonstrate it can be done or what it's effects actually are
It's making me wonder about the risks of it and if it's even a substantial threat to machines being maintained with best practices and isolated from questionable installations and reckless web surfing.
I'm genuinely interested in any information I can be pointed to about how these attacks are injected into a working system. Any and all replies would be really appreciated
There is no attack vector description in any of the published ones I've seen so far. They seem to just miraculously appear and attack these systems from nowhere or that's how it's described. As far as I understand you have to have a means to inject code to be subjected to it's effects and I have yet to find an example of how this malicious code get's into a machine to begin with. Even the variant that supposedly can attack through a browser is suspect because I have yet to find a working example or story of such an attack so far even to demonstrate it can be done or what it's effects actually are
It's making me wonder about the risks of it and if it's even a substantial threat to machines being maintained with best practices and isolated from questionable installations and reckless web surfing.
I'm genuinely interested in any information I can be pointed to about how these attacks are injected into a working system. Any and all replies would be really appreciated