Security researchers have discovered a critical vulnerability in all Apple Silicon processors (M1, M2, M3) – GoFetch.
It allows you to bypass encryption and steal cryptographic data from the CPU cache. Thanks to this, the hacker was able to create a powerful cryptokey to access encrypted information.
The vulnerability is due to the operation of the DMP (Memory Dependent Data Prefetching) mechanism. It is necessary to load data into memory before it is used. In some cases, the DMP loads inappropriate data into the cache chip, causing the facility cord to be disconnected. Using this application, attackers can upload personal data to open the cache by stealing it.
Experts say this error cannot be corrected. You can only mitigate the effects of reduced performance of your own processors by redirecting encryption components to the power of the E-core, which is almost entirely DMP.
The researchers note that there are still a number of factors that make the risk of confidential information leakage low.
First, all Macs initially block the installation of unknown applications – manual confirmation is required. Secondly, it will take a lot of time to take action: from 54 minutes to 10 hours, so the virus application must be active all this time. [9to5]
Source: Iphones RU

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.