Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

How to Protect Your PC from the ZombieLoad Attack

Sean Williamson June 3, 2019
man-in-front-computer-covering-his-face-with-his-hands-zombieload-hacker-attack

Researchers discovered a set of frailties in Intel’s processors that can allow potential malicious hackers to retrieve data from CPUs.

ZombieLoad, also technically known as CVE-2018-12130 as disclosed by Intel, is a chip flaw, which might result in leaking secrets. It lies in the same category of side-channel attacks as Meltdown and Spectre did back in 2018.

Researchers from the Graz University of Technology first discovered the flaw and later disclosed it to Intel. This flaw affects all the Intel chips made since 2011. As a result of this intimation, Intel has issued a code to fix this flaw which is yet to be implemented by individual manufacturers and then installed by individual users.

Intel has graded the severity of this attack as “medium”. Whereas researchers claim that, it is far more serious than stated.

Zombie Loads are huge amounts of data that a CPU cannot deal with, without crashing. These Loads come with microcode that prevents the PC from crashing. These Loads may contain sensitive data and the flaw in Intel chips may allow this information to be read by unauthorized entities.

 

Attack Overview

 

ZombieLoad itself is an offbeat category of the side-channel attacks. These invasions also referred to as data-sampling attacks, have opened a completely new field of research for the folks in academia.

ZombieLoad thrives on the fact that the fill buffer is accessible by all logical CPUs and it doesn’t recognize privileges yet. Hence putting a great amount of sensitive data at risk. Owing to the fault in Intel microchips, the data load asks for a microcode to assist it. This leads the load to sensitive information for a while before it is directed back to where it was intended to go.

Apple, Google, and Microsoft announced the availability of updates recently. Hence, ZombieLoad isn’t the kind of flaw someone is imminently at risk from.

Make sure your internet provider offers a reliable internet connection to download these updates timely.  After the updates, a potential attacker won’t be able to exploit ZombieLoad remotely. They’ll have to run a code on the targeted machine to be able to access its data.

 

 Monitoring Browsing-Behavior

 

ZombieLoad is capable of detecting certain byte sequences within the loaded data. For example, an unprivileged attacker, using a different machine can leverage ZombieLoad to screen a browsing session. Researchers haven’t yet confirmed any malicious activity on this flaw.

  • Keyword Detection: Keyword detection lets the attacker determine the type of information a victim is consuming based on the keywords used in a certain browsing session.
  • URL Recovery: In this kind of attack, hit and trial method is used to determine the domains that are repetitively visited by the victim. Hence helping the attacker learn about their browsing behavior. This kind of attack is not just restricted to web domains, but it can also lead to other predictable entries like credit-card numbers and session cookies.

“Experts say that trying to protect yourself from ZombieLoad can result in performance losses of up to 40% initially.”

 

How to Solve It?

 

ZombieLoad, as much as the authorities are downplaying it, is still a threat to sensitive information. Mitigating this issue is the need of the hour. I have listed some ways to fix this issue for each kind of operating system. I’ll keep updating the list as new solutions come out.

 

ZombieLoad Fix for Android Devices

 

Although most Android devices run on ARM hardware and will not be affected by ZombieLoad directly. However, any Android device using Intel Hardware will need to install patches issued by the hardware manufacturer.

Check their websites or Twitter to get the latest updates on the release dates of these patches.

 

 ZombieLoad Fix for Windows PCs

 

Windows PCs are the ones that are going to be affected the most by this attack, Including Windows 10, 7 and XP computers. On the brighter side, Microsoft has already released an update that should download automatically to your computer. However, check the latest windows update, just to be sure.

You can also download the fix from Microsoft’s support website.

 

ZombieLoad Fix for Mac Users

 

Apple has also released a patch to mitigate ZombieLoad that brought all the MacBooks, released since 2011, under threat.

However, the application of all these patches on Macs may result in a 40% fall in the performance. We really expect that Mac and Intel come to terms to reduce this performance fall to a bare minimum.

 

Fix ZombieLoad for Linux

 

Red Hat had developed security updates for products, which may result in performance issues but are capable of mitigating the bigger issue at hand. Until the time these performance issues are catered to, keep the app installed in your devices.

 

How to Protect Firefox and Chrome Against ZombieLoad?

 

Mozilla in its statement said that Firefox Beta and Firefox Nightly already have these patches installed. Whereas Google advised Chrome users to update their Operating System to avoid any inconvenience.

In short, if you are someone who is concerned about his data security, one quick solution is installing all the latest updates of your operating system. Most OS do it automatically, whereas others might require you to update manually, depending on your system settings.


Sean Williamson lives in New York City and calls himself the 'tech-bro', given his special interest in everything that's digital. He works as a writer in a company named Local Cable Deals. Find him on his social profiles: Twitter, Tumblr, and Pinterest. 


 

Related stories

 

Boost Your Computer's Performance for Increased Productivity

How Some Websites Secretly Hijack Your PC to Generate Revenue Online

Simple Ways to Keep Your Client Accounts Safe from Cybercrime

The Best Ways to Keep Your Online Transactions Secure

The Perfect Security Plan for Your Business

Major Facebook Hacking Highlights Risk of Using Social Networks to Login to Other Sites

Apple Apps Secretly Record People’s Screens Without Permission

How to Make Your Mobile Device & Software Run Quicker

 

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

No spam. Just great stories. Promise!
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


5 Less Appreciated Benefits of Becoming a Copywriter
Alexis Davis

How to Choose the Best Gaming Laptop for an Uncompromised Experience
How to Choose the Best Gaming Laptop for an Uncompromised Experience
George Mathews

Google Chrome's 'Articles for You' Feature Drives 2,100% More Website Traffic
Google Chrome's 'Articles for You' Feature Drives 2,100% More Website Traffic
Alexis Davis

The Secret Magic of Manhattan’s Christmas Lighting
The Secret Magic of Manhattan’s Christmas Lighting
George Mathews

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 

EXPLORE MORE ...

black-nav-bar1.png

News & Features  ›


Why Consumers, More and More, Are Looking for 'Guilt-Free' Shopping

Up Your User-Generated Content Game to Corner the Social Media Market

FCC Officially Repeals Net Neutrality Rules, Rolls Back 3 Key Regulations


The Most Annoying Video Call Habits at Work - Are You Guilty?

The Digital Playground: Creating Safe and Engaging Online Spaces for Kids

Understanding Fathers’ Rights in the Child Custody Process

hor-line-blue

Tech & Trends  ›


IT-team-pointing-computer-screen-ai-cybersecurity-threats

Different Ways Criminals Are Using AI in Cyberattacks

young-women-working-call-center-ai-call-recording-staff-wellbeing

How AI Call Recording Improve Mental Wellbeing Of Customer Service Staff

Featured Image – The Far-Reaching Impact of Tech & Digital Transformations in Business

The Far-Reaching Impact of Tech & Digital Transformations in Business


Understanding the Limitations of Antivirus Software

5 Web Accessibility Issues to Avoid

Ethics of Quality Assurance Tech Companies Need to Follow
 

hor_line_yellow

Arts & Culture  ›


writer-sitting-table-writing--sketchpad-research - illustration

Why Every Writer Needs Proper Research to Write Fiction

How Content Writers Can Benefit from Web Scraping

How Content Writers Can Benefit from Web Scraping

Image for People Who Point Out Typos are the Type of Jerks Everyone Suspects them to Be

People Who Point Out Typos Are Unlikeable Types Everyone Suspects them to Be


12 Reasons Reading Widely Is So Important for Writers

How Reading More Inspires Better Writing

10 Fun Hobbies & Activities for Couples to Enjoy Together

hor-line-brown

Business & Economy  ›


man-walking-away-carrying-box-full-of-stuff-quit-job

Should You Quit Your Job? 12 Signs You Should Resign and Move On

How Content Writers Can Balance Creativity and Marketing Techniques

How to Break Into the Market As a New Freelance Writer (and Land Your First Jobs)


How Salesforce Anywhere Can Transform Remote Work With Real-Time Collaboration

Maximizing Device Compatibility with Restreaming and Packaging: Benefits for OTT Operators

Smooth Operator: 5 Daily Habits that Dramatically Reduce Repair Frequency

hor-line-green

Health & Style  ›


boy-girl-wearing-animal-print-childrens-animal-print-clothes

Why Kids Animal Print Clothes Should Be a Wardrobe Staple

couple-buy-new-house-receiving-keys

5 Tips to Make Informed Decisions As a First-Time Home Buyer

How Do You Limit the Spread of Germs in Your Home? Quick Tips

How Do You Limit the Spread of Germs in Your Home? Quick Tips

hori-3.jpg

Asbestos Hazard: Your Responsibilities As a Property Owner

hori-3.jpg

Blissful Ways to Pamper Yourself at Low Cost

hori-3.jpg

7 Must-Haves for Hiking, Fishing, and Other Outdoor Activities
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2025 The WWS Daily.