Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

How to Protect Your PC from the ZombieLoad Attack

Sean Williamson June 3, 2019
man-in-front-computer-covering-his-face-with-his-hands-zombieload-hacker-attack

Researchers discovered a set of frailties in Intel’s processors that can allow potential malicious hackers to retrieve data from CPUs.

ZombieLoad, also technically known as CVE-2018-12130 as disclosed by Intel, is a chip flaw, which might result in leaking secrets. It lies in the same category of side-channel attacks as Meltdown and Spectre did back in 2018.

Researchers from the Graz University of Technology first discovered the flaw and later disclosed it to Intel. This flaw affects all the Intel chips made since 2011. As a result of this intimation, Intel has issued a code to fix this flaw which is yet to be implemented by individual manufacturers and then installed by individual users.

Intel has graded the severity of this attack as “medium”. Whereas researchers claim that, it is far more serious than stated.

Zombie Loads are huge amounts of data that a CPU cannot deal with, without crashing. These Loads come with microcode that prevents the PC from crashing. These Loads may contain sensitive data and the flaw in Intel chips may allow this information to be read by unauthorized entities.

 

Attack Overview

 

ZombieLoad itself is an offbeat category of the side-channel attacks. These invasions also referred to as data-sampling attacks, have opened a completely new field of research for the folks in academia.

ZombieLoad thrives on the fact that the fill buffer is accessible by all logical CPUs and it doesn’t recognize privileges yet. Hence putting a great amount of sensitive data at risk. Owing to the fault in Intel microchips, the data load asks for a microcode to assist it. This leads the load to sensitive information for a while before it is directed back to where it was intended to go.

Apple, Google, and Microsoft announced the availability of updates recently. Hence, ZombieLoad isn’t the kind of flaw someone is imminently at risk from.

Make sure your internet provider offers a reliable internet connection to download these updates timely.  After the updates, a potential attacker won’t be able to exploit ZombieLoad remotely. They’ll have to run a code on the targeted machine to be able to access its data.

 

 Monitoring Browsing-Behavior

 

ZombieLoad is capable of detecting certain byte sequences within the loaded data. For example, an unprivileged attacker, using a different machine can leverage ZombieLoad to screen a browsing session. Researchers haven’t yet confirmed any malicious activity on this flaw.

  • Keyword Detection: Keyword detection lets the attacker determine the type of information a victim is consuming based on the keywords used in a certain browsing session.
  • URL Recovery: In this kind of attack, hit and trial method is used to determine the domains that are repetitively visited by the victim. Hence helping the attacker learn about their browsing behavior. This kind of attack is not just restricted to web domains, but it can also lead to other predictable entries like credit-card numbers and session cookies.

“Experts say that trying to protect yourself from ZombieLoad can result in performance losses of up to 40% initially.”

 

How to Solve It?

 

ZombieLoad, as much as the authorities are downplaying it, is still a threat to sensitive information. Mitigating this issue is the need of the hour. I have listed some ways to fix this issue for each kind of operating system. I’ll keep updating the list as new solutions come out.

 

ZombieLoad Fix for Android Devices

 

Although most Android devices run on ARM hardware and will not be affected by ZombieLoad directly. However, any Android device using Intel Hardware will need to install patches issued by the hardware manufacturer.

Check their websites or Twitter to get the latest updates on the release dates of these patches.

 

 ZombieLoad Fix for Windows PCs

 

Windows PCs are the ones that are going to be affected the most by this attack, Including Windows 10, 7 and XP computers. On the brighter side, Microsoft has already released an update that should download automatically to your computer. However, check the latest windows update, just to be sure.

You can also download the fix from Microsoft’s support website.

 

ZombieLoad Fix for Mac Users

 

Apple has also released a patch to mitigate ZombieLoad that brought all the MacBooks, released since 2011, under threat.

However, the application of all these patches on Macs may result in a 40% fall in the performance. We really expect that Mac and Intel come to terms to reduce this performance fall to a bare minimum.

 

Fix ZombieLoad for Linux

 

Red Hat had developed security updates for products, which may result in performance issues but are capable of mitigating the bigger issue at hand. Until the time these performance issues are catered to, keep the app installed in your devices.

 

How to Protect Firefox and Chrome Against ZombieLoad?

 

Mozilla in its statement said that Firefox Beta and Firefox Nightly already have these patches installed. Whereas Google advised Chrome users to update their Operating System to avoid any inconvenience.

In short, if you are someone who is concerned about his data security, one quick solution is installing all the latest updates of your operating system. Most OS do it automatically, whereas others might require you to update manually, depending on your system settings.


Sean Williamson lives in New York City and calls himself the 'tech-bro', given his special interest in everything that's digital. He works as a writer in a company named Local Cable Deals. Find him on his social profiles: Twitter, Tumblr, and Pinterest. 


 

Related stories

 

Boost Your Computer's Performance for Increased Productivity

How Some Websites Secretly Hijack Your PC to Generate Revenue Online

Simple Ways to Keep Your Client Accounts Safe from Cybercrime

The Best Ways to Keep Your Online Transactions Secure

The Perfect Security Plan for Your Business

Major Facebook Hacking Highlights Risk of Using Social Networks to Login to Other Sites

Apple Apps Secretly Record People’s Screens Without Permission

How to Make Your Mobile Device & Software Run Quicker

 

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

No spam. Just great stories. Promise!
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


Paradies Lagardère First to Launch MishiPay’s Scan, Pay & Go Technology in U.S. Airports
Paradies Lagardère Launch MishiPay’s Scan, Pay & Go Tech in U.S. Airports
Phoebe Irving

Audible Lets You ‘Skip to the Good Part’ in Audio Romance Novels
How to Improve Team Efficiency and Productivity in Business
Sarah Kaminski

Start Your Morning Right: 6 Appliances to Whip Up a Good Breakfast
Mykie Concepcion

Logistics Solution with Industry-First 12m Tall Robot Can Scan Warehouses of Any Dimension
Logistics Solution with 12m Tall Robot Can Scan Warehouses of Any Dimension
Alexis Davis

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 

EXPLORE MORE ...

black-nav-bar1.png

News & Features  ›


laptop-screen-amazon-fake-reviews

Amazon's Fake Reviews: Most Untrustworthy Categories Revealed

google-logo-top-building-link-attributes-changes-meaning

What Google's Recent Change in “NoFollow” Links Means

The Most Instagramed Office Buildings in the World Ranked

The Most Instagramed Office Buildings in the World Ranked


The Most Annoying Video Call Habits at Work - Are You Guilty?

The Digital Playground: Creating Safe and Engaging Online Spaces for Kids

Understanding Fathers’ Rights in the Child Custody Process

hor-line-blue

Tech & Trends  ›


The Value of Integrating Remote Terminal Units in SCADA Systems

The Value of Integrating Remote Terminal Units in SCADA Systems

nfts_new_front_building_artist_impression

The Environmental Effect of NFTs

two-young-women-smartphone-mobile-app-development

The Key to Effective Mobile App Development


Understanding the Limitations of Antivirus Software

5 Web Accessibility Issues to Avoid

Ethics of Quality Assurance Tech Companies Need to Follow
 

hor_line_yellow

Arts & Culture  ›


Could You Be Obsessed with Writing?

Could You Be Obsessed with Writing?

Featured Image – Hacking Growth: How Today's Fastest-Growing Companies Drive Breakout Success

Hacking Growth: How Fastest-Growing Companies Drive Success

woman-playing-chello-happy-best_musical_instruments_for_beginners

10 Best Musical Instruments for Beginners


How Reading More Inspires Better Writing

10 Fun Hobbies & Activities for Couples to Enjoy Together

5 Ways to Make Writing a Lot More Fun

hor-line-brown

Business & Economy  ›


The Most Unexpected Challenge for SMEs Is Recruitment: Tips for Great Hires

The Most Unexpected Challenge for SMEs Is Recruitment: Tips for Hiring

The Expectations vs Reality of Becoming an Entrepreneur

guerrilla-marketing-advertising

Why You Should Promote Your Brand with Guerrilla Marketing Tactics


How Salesforce Anywhere Can Transform Remote Work With Real-Time Collaboration

Maximizing Device Compatibility with Restreaming and Packaging: Benefits for OTT Operators

Smooth Operator: 5 Daily Habits that Dramatically Reduce Repair Frequency

hor-line-green

Health & Style  ›


man-using-laptop-during-lunch-break-eating-food-combinations

Surprising Food Combinations That Can Negatively Impact Your Health

7 Tips to Find the Best Dentist

7 Tips to Find the Best Dentist for Your Oral Health

woman-skincare-routine-by-the-window

4 Tips for the Ultimate Eco-Friendly Skincare Routine

hori-3.jpg

Blissful Ways to Pamper Yourself at Low Cost

hori-3.jpg

7 Must-Haves for Hiking, Fishing, and Other Outdoor Activities

hori-3.jpg

The Different Types of Wine Explained in a Nutshell
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2025 The WWS Daily.