Explore our library of thought leadership articles and insights.
Podcasts
Stream informative and exclusive episodes of DomainTools “Breaking Badness” podcast.
Research
Read the latest from DomainTools Investigations.
Webinars
Watch live and on-demand cybersecurity training from the DomainTools team.
White Papers
Discover the real-world impact of DomainTools DNS intelligence.
Client Resources
Technical Documentation
Navigate DomainTools features effortlessly with our comprehensive guides.
API Documentation
Access everything you need, including endpoint, response formats, sample queries, and product service levels.
Webinars
Through close partnerships with leading security vendors, DomainTools embeds our best-in-class domain profiles and predictive Risk Score directly within your preferred SIEM, SOAR, and TIP solutions.
Watch Now
Company
About
Meet our exceptional executive team of experts and industry leaders.
Pressroom
Access the latest DomainTools news and press coverage.
Contact
We’re here to help with product info, pricing, and current and future account services.
MIT researchers discovered Apple’s M1 chips have an “unpatchable” hardware vulnerability that could allow attackers to break through its last line of security defenses
The M1 chip is a desktop class ARM processor designed and built by the Apple team to eliminate their reliance on Intel x86 chips
It powers the bulk of their desktop / laptop lineup and is finding its way into their iPads as well
They are chock full of cores and are quite power efficient
And as all chips these days with a lot of cores (think chips on chips on chips) they use these extra cores to leverage “branch prediction” to speed up applications that are running
Branch prediction allows them to parallel process multiple pathways of instructions and then “choose” the right branch
In their research, the MIT team found the pointer authentication codes (PAC) can be defeated, and there’s no patch to fix it
Apple continues to come up with newer and newer designs and came up with this pointer authentication to make sure the stuff that comes out on the other side is the stuff that came in on the front side
The folks at MIT came in and said that work may have been for not
This attack is called “PACman”
It will “guess” a PAC with speculative execution
There are only so many values for the PAC, so it’s possible to guess the correct one
The researchers also found that this attack works against the kernel
“Kernel” being the software core of a device’s operating system
This has dire implications future security work
Pointer authentication was meant to be the last defense against attackers, but this research shows that it isn’t as robust as previously thought
Pointer authentication is used on all of Apple’s custom ARM-based silicon so far (M1, M1 Pro, and M1 Max)
Apple is currently working on the M2 chip, which also supports pointer authentication, but MIT has not yet tested the attack on it
Apple is appreciative of the research done by MIT, though they currently do not believe this poses an immediate risk to users
Current state, Apple could certainly be correct
It’s not immediately apparent right now what could happen, but it will be in so many different chips, Apple and Android alike
In terms of next steps, there isn’t a whole lot anyone can do at this point
Folks are working on detection
The tricky part about this is things are happening on this speculative branch (the untraveled branch)
It’s difficult to detect, if not impossible at this point
Confluence, an Atlassian product, had another remote code execution vulnerability
If you sent the correct malformed packet, under the right circumstances, you could remote execute any arbitrary code you wanted
This is also not the first instance of this type of occurrence
There was a similar incident in 2021, so this probably isn’t the last time we’ll hear about this type of vulnerability
On June 2, Atlassian released a security advisory outlining an active zero-day campaign targeting a critical flaw that is being tracked as CVE-2022-26134
This vulnerability impacts all versions of the Confluence Server and Confluence Data Center
Atlassian classified this vulnerability as critical
Immediate recommendation was to put Confluence behind a web application firewall
You do have to be able to talk to the vulnerable server over the network in order to exploit it, so if it’s internet-exposed, you want to limit that access
Without a patch available in the first 24 hours, the risk of something happening was too big, so we at DomainTools shut down our Confluence server to be overly cautious
A patch was available the next day, to Atlassian’s credit
The million dollar question is: who is behind this?
Threat actors curious about proprietary technologies (typically, company information lives on these wikis). This is a great opportunity to collect intelligence to hurt a company if publicly released
Likely commercial espionage space, but it’s hard to say
Two Truths and a Lie
Introducing our newest segment on Breaking Badness. We are going to play a game you are all likely familiar with called two truths and a lie, with a fun twist. Each week, one us with come prepared with three article titles, two of which are real, and one is, you guessed it, A LIE.
You'll have to tune in to find out!
Current Scoreboard
This Week’s Hoodie/Goodie Scale
Cuz I’m The PACMAN[Taylor]: 4.75/10 Hoodies[Daniel]: 8/10 Hoodies
Zero Days of Summer[Taylor]: 6.5/10 Hoodies[Daniel]: 8/10 Hoodies
That’s about all we have for this week, you can find us on Twitter @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.*A special thanks to John Roderick for our incredible podcast music!