Cybercriminals can now hide malicious code in your GPU VRAM

More From Author

See more articles

Myntra Upcoming Sales 2025: Your Fashion Calendar for Maximum...

Myntra Upcoming Sales 2025 In the ever-evolving world of fashion e-commerce, Myntra continues to be India's go-to destination...

Dimensity 6020 vs Snapdragon 695: Mid-Range Chipset Battle

Dimensity 6020 vs Snapdragon 695: Qualcomm Snapdragon 695 5G (SD695) is a fast mid-range ARM-based SoC found...

My Jio Recharge Plans as of January 4,...

My Jio Recharge Plans: Since its establishment in 2016, Reliance Jio has made a remarkable impact on...

Do you know that as of right now, Cybercriminals are looking to exploit you by hiding malicious code inside of its VRAM? Yes, that’s true and according to cyber experts, this process allows the code from being detected by antivirus scanners sweeping the PC’s main RAM. According to reports, a proof-of-concept (POC) for a tool that makes this possible was sold online, just a few days ago.

Graphics cards have only one purpose and that’s providing an accelerating 3D workload. But the current modern graphics cards, especially the best ranking ones have their complete ecosystems which focus on accelerating graphics. They have thousands of cores for video acceleration, and amongst them, a few control cores also have their memory buffer (VRAM) to load all of those game textures.

According to recent reports,  it’s possible to hide the malicious code in the graphic card’s memory buffer and the rest of the system will not even detect it. However, there are not many details revealed about this new hack but the posting hit the web on August 8 and was reportedly sold by August 25 for an undisclosed amount.

Though it’s not clear as to how the exploit will work the hacker offered the toolkit with the PoC describing it as an exploit that allocates address space in the GPU VRAM and stealthily inserts and executes the code from there since antivirus can not scan a GPU’s VRAM. 

This isn’t the first time there has appeared an exploit such as these, just a few years back researchers published the open-source Jellyfish attack that exploited the LD_PRELOAD technique from OpenCL to connect system calls and the GPU. It forced malicious code execution from the GPU and the PC was unable to detect its existence.

source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

━ Related News

Featured

━ Latest News

Featured