A group of academic researchers on Wednesday released a study showing how they launched an attack that could force an Apple Safari browser to show personal information, passwords or credit card data by exploiting a side-channel vulnerability in Apple’s A-series or M-series CPUs.In a side-channel attack, an exploit seeks to extract secrets from a chip or a computer system. The type of side-channel attack the researchers demonstrated is called speculative execution, a performance enhancement feature in modern chips that has led to a broad range of attacks over the past few years.Dubbed iLeakage, the attack was developed by a team of academics from Georgia Tech, University of Michigan, and Ruhr University Bochum in Germany who aimed to study the security issues with Apple’s new Arm chip architecture.“While significant effort has been invested analyzing x86 CPUs, the Apple ecosystem remains largely unexplored,” said the researchers in a very detailed research paper. Researchers from the Georgia Tech School of Cybersecurity and Privacy said in an FAQ about iLeakage that code running in one web browser tab should be isolated and not able to infer anything about other tabs that a user has open. However, with iLeakage, the researchers said malicious JavaScript and WebAssembly code can read the content of a target webpage when a target visits and clicks on an attacker's webpage.The researchers said that while Apple has implemented a mitigation for iLeakage in Safari, this mitigation is not enabled by default, and users can only enable it on the macOS. Because the mitigation has been marked as unstable, the Georgia Tech researchers said they will keep their FAQ updated as Apple pushes more iOS and macOS updates.Devices vulnerable to iLeakage include machines running macOS or iOS with Apple’s A-series or M-series CPUs, which includes all recent iPhones and iPads, as well as Apple's Mac laptops and desktops from 2020 and onwards. To date, there’s no indication that iLeakage has been exploited in the wild.
Endpoint/Device Security, Application security
‘iLeakage’ side-channel flaw in Apple Safari can share passwords, messages

University researchers described how they launched an attack that could force an Apple Safari browser to show personal information. (Adobe Stock)
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds