Skip to main content
HomeThe WWS Daily

- News, tips, inspiration you can trust to thrive in today’s digital age.

Search form

Main menu

  • Home
  • News & Features
  • Business & Economy
  • Tech & Trends
  • Health & Style
  • Arts & Culture
  • Contact Us

How to Protect Your PC from the ZombieLoad Attack

Sean Williamson June 3, 2019
man-in-front-computer-covering-his-face-with-his-hands-zombieload-hacker-attack

Researchers discovered a set of frailties in Intel’s processors that can allow potential malicious hackers to retrieve data from CPUs.

ZombieLoad, also technically known as CVE-2018-12130 as disclosed by Intel, is a chip flaw, which might result in leaking secrets. It lies in the same category of side-channel attacks as Meltdown and Spectre did back in 2018.

Researchers from the Graz University of Technology first discovered the flaw and later disclosed it to Intel. This flaw affects all the Intel chips made since 2011. As a result of this intimation, Intel has issued a code to fix this flaw which is yet to be implemented by individual manufacturers and then installed by individual users.

Intel has graded the severity of this attack as “medium”. Whereas researchers claim that, it is far more serious than stated.

Zombie Loads are huge amounts of data that a CPU cannot deal with, without crashing. These Loads come with microcode that prevents the PC from crashing. These Loads may contain sensitive data and the flaw in Intel chips may allow this information to be read by unauthorized entities.

 

Attack Overview

 

ZombieLoad itself is an offbeat category of the side-channel attacks. These invasions also referred to as data-sampling attacks, have opened a completely new field of research for the folks in academia.

ZombieLoad thrives on the fact that the fill buffer is accessible by all logical CPUs and it doesn’t recognize privileges yet. Hence putting a great amount of sensitive data at risk. Owing to the fault in Intel microchips, the data load asks for a microcode to assist it. This leads the load to sensitive information for a while before it is directed back to where it was intended to go.

Apple, Google, and Microsoft announced the availability of updates recently. Hence, ZombieLoad isn’t the kind of flaw someone is imminently at risk from.

Make sure your internet provider offers a reliable internet connection to download these updates timely.  After the updates, a potential attacker won’t be able to exploit ZombieLoad remotely. They’ll have to run a code on the targeted machine to be able to access its data.

 

 Monitoring Browsing-Behavior

 

ZombieLoad is capable of detecting certain byte sequences within the loaded data. For example, an unprivileged attacker, using a different machine can leverage ZombieLoad to screen a browsing session. Researchers haven’t yet confirmed any malicious activity on this flaw.

  • Keyword Detection: Keyword detection lets the attacker determine the type of information a victim is consuming based on the keywords used in a certain browsing session.
  • URL Recovery: In this kind of attack, hit and trial method is used to determine the domains that are repetitively visited by the victim. Hence helping the attacker learn about their browsing behavior. This kind of attack is not just restricted to web domains, but it can also lead to other predictable entries like credit-card numbers and session cookies.

“Experts say that trying to protect yourself from ZombieLoad can result in performance losses of up to 40% initially.”

 

How to Solve It?

 

ZombieLoad, as much as the authorities are downplaying it, is still a threat to sensitive information. Mitigating this issue is the need of the hour. I have listed some ways to fix this issue for each kind of operating system. I’ll keep updating the list as new solutions come out.

 

ZombieLoad Fix for Android Devices

 

Although most Android devices run on ARM hardware and will not be affected by ZombieLoad directly. However, any Android device using Intel Hardware will need to install patches issued by the hardware manufacturer.

Check their websites or Twitter to get the latest updates on the release dates of these patches.

 

 ZombieLoad Fix for Windows PCs

 

Windows PCs are the ones that are going to be affected the most by this attack, Including Windows 10, 7 and XP computers. On the brighter side, Microsoft has already released an update that should download automatically to your computer. However, check the latest windows update, just to be sure.

You can also download the fix from Microsoft’s support website.

 

ZombieLoad Fix for Mac Users

 

Apple has also released a patch to mitigate ZombieLoad that brought all the MacBooks, released since 2011, under threat.

However, the application of all these patches on Macs may result in a 40% fall in the performance. We really expect that Mac and Intel come to terms to reduce this performance fall to a bare minimum.

 

Fix ZombieLoad for Linux

 

Red Hat had developed security updates for products, which may result in performance issues but are capable of mitigating the bigger issue at hand. Until the time these performance issues are catered to, keep the app installed in your devices.

 

How to Protect Firefox and Chrome Against ZombieLoad?

 

Mozilla in its statement said that Firefox Beta and Firefox Nightly already have these patches installed. Whereas Google advised Chrome users to update their Operating System to avoid any inconvenience.

In short, if you are someone who is concerned about his data security, one quick solution is installing all the latest updates of your operating system. Most OS do it automatically, whereas others might require you to update manually, depending on your system settings.


Sean Williamson lives in New York City and calls himself the 'tech-bro', given his special interest in everything that's digital. He works as a writer in a company named Local Cable Deals. Find him on his social profiles: Twitter, Tumblr, and Pinterest. 


 

Related stories

 

Boost Your Computer's Performance for Increased Productivity

How Some Websites Secretly Hijack Your PC to Generate Revenue Online

Simple Ways to Keep Your Client Accounts Safe from Cybercrime

The Best Ways to Keep Your Online Transactions Secure

The Perfect Security Plan for Your Business

Major Facebook Hacking Highlights Risk of Using Social Networks to Login to Other Sites

Apple Apps Secretly Record People’s Screens Without Permission

How to Make Your Mobile Device & Software Run Quicker

 

 

SUBSCRIBE TO OUR NEWSLETTER  newsletter icon.png

Get our best content, news, tips, and inspiration in your inbox - free.

No spam. Just great stories. Promise!
 

 

Join Over 20,000 Subscribers!

Get our best content, tips, and inspiration free in your inbox. Subscribe ››

Connect with us:  twitter.gif linkedin-gray.jpg email.gif RSS feed

 

 

 

 

 

Most read this week


Digital Marketing 101: A Guide for Content Marketing and Advertisement
Digital Marketing 101: A Guide for Content Marketing and Advertisement
Jeremy Ferguson

Are Podcasts Still an Effective Marketing Tactic for Your Business?
Are Podcasts Still an Effective Marketing Tactic?
Rodney Laws

How to Make Your Job or Career Greener. It’s Easier Than You Think
How to Make Your Job or Career Greener - It’s Easier Than You Think
George Mathews

Future of Low-Code App Development is Getting Brighter
The Future of Low-Code App Development is Getting Brighter
Alexis Davis

 

Got a story or tip for us?

 

Tips_0_0_0.png

Here's how to submit it →

 

 

 

 

EXPLORE MORE ...

black-nav-bar1.png

News & Features  ›


uk_border_heathrow_airport

Dangers of Nationality and Borders Bill: UK Govt’s New Plan for Immigration

recreational-vehicle-rise-facts-emerging-trends - illustration

Rise of Recreational Vehicles: Facts and Emerging Trends You Should Know

VPN Usage Shoots by 65% as Working from Home Grows Amid Covid-19 Crisis

VPN Usage Shoots by 65% as Working from Home Grows Amid Covid-19 Crisis


Understand and Plan Your Digital Afterlife

The Most Annoying Video Call Habits at Work - Are You Guilty?

The Digital Playground: Creating Safe and Engaging Online Spaces for Kids

hor-line-blue

Tech & Trends  ›


saas-for-keyword-research-in-seo-concept

Unlocking the Power of SaaS for Keyword Research in SEO

cloud-computing-illastration

How to Implement Cloud Computing & Stay Ahead of the Game in Business

Data Encryption: What It Is, How It Works, and Why You Should Care


Tech Troubles? 4 Business Strategies To Avoid Tech Disasters

Understanding the Limitations of Antivirus Software

5 Web Accessibility Issues to Avoid
 

hor_line_yellow

Arts & Culture  ›


Woman Reading Book Image for 15 Hotly-Anticipated Books

15 Hotly-Anticipated Books of 2017

16 Empowering Thoughts to Help You Stay Strong, Get Through Trying Times

16 Empowering Thoughts to Help You Stay Strong, Get Through Trying Times

Featured Image – 4 Things You Should Know About Web Readers

4 Things You Should Know About Web Readers


What Your Handwriting Says About You

12 Reasons Reading Widely Is So Important for Writers

How Reading More Inspires Better Writing

hor-line-brown

Business & Economy  ›


Top 10 Customer Acquisition Techniques for Your Websites

Top 20 Hacks to Use Instagram Video Ads to Grow Your Business

Is It Better to Build a Website Yourself or Hire Someone to Do It?

How Google’s AIO Is Affecting SEO


10 Lame Excuses You Probably Use to Procrastinate

10 Ways Resourceful People Build Resilience & Turn Failure to Success

How to Buy a House or Property With Bad Credit

hor-line-green

Health & Style  ›


Still Hungry After a Meal? Here's Why (And What to Do About It)

Still Hungry After a Meal? Here's Why (And What to Do About It)

How to Train Your Dog and Build a Stronger Connection

The Healthiest Cities to Live in the UK REVEALED!

The Healthiest Cities to Live in the UK REVEALED!

hori-3.jpg

Asbestos Hazard: Your Responsibilities As a Property Owner

hori-3.jpg

Blissful Ways to Pamper Yourself at Low Cost

hori-3.jpg

7 Must-Haves for Hiking, Fishing, and Other Outdoor Activities
 

Home | About Us | Contributors | Submissions | Advertise | Disclosure | Privacy Policy | Contact Us

Follow Us:

twitter_e.jpg linkedin-pg.jpg email-updates_icon.jpg

Committed to quality content and journalistic ethics.

RSS rss

Search WWS search-icon-trans_0_1.png

© 2025 The WWS Daily.