Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Artemis II Splashdown Signals A Step Closer to Mass Space Travel

      April 12, 2026

      Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

      April 8, 2026

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

        April 8, 2026

        OpenAI Expands Influence With Strategic TBPN Media Acquisition

        April 8, 2026

        Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

        April 6, 2026

        Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

        April 6, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026
      • AI

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        The Rise Of Agentic AI Signals A Shift From Tools To Autonomous Digital Actors

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Ai-Powered Startup Signals Rise Of One-Person Billion-Dollar Companies

        April 8, 2026

        OpenAI Secures Historic $122 Billion Funding Round at $852 Billion Valuation

        April 7, 2026
      • Security

        Anthropic Code Leak Raises Questions About AI Security and Industry Oversight

        April 8, 2026

        DeFi Platform Drift Halts Operations After Multi-Million Dollar Crypto Hack

        April 7, 2026

        Fake WhatsApp App Exposes Users To Government Spyware Operation

        April 7, 2026

        ICE Deploys Controversial Spyware Tool In Drug Trafficking Investigations

        April 7, 2026

        Telehealth Firm Discloses Breach Amid Rising Digital Health Vulnerabilities

        April 6, 2026
      • Health

        European Crackdown Targets Social Media’s Impact on Children

        April 8, 2026

        AI Chatbots Draw Scrutiny As Teens Engage In Intimate Roleplay And Emotional Dependency

        April 8, 2026

        Australia Moves To Curb Social Media Addiction Among Youth With Expanded Under-16 Ban

        April 5, 2026

        Australia’s eSafety Regulator Warns Big Tech As Teens Circumvent Social Media Restrictions

        April 5, 2026

        Meta Finally Held Accountable For Harming Teens, But Real Reform Remains Uncertain

        April 2, 2026
      • Science

        Artemis II Splashdown Signals A Step Closer to Mass Space Travel

        April 12, 2026

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Blue Origin’s Orbital Data Center Push Signals New Frontier in Tech Infrastructure

        March 27, 2026

        Quantum Cryptography Pioneers Awarded Computing’s Highest Honor

        March 25, 2026
      • Tech

        Peter Thiel’s Bold Ag-Tech Gamble Signals High-Tech Disruption of Traditional Ranching

        April 6, 2026

        Zuckerberg Quietly Offers Musk Support As Tech Titans Align Around Government Power

        April 4, 2026

        White House Tech Advisor David Sacks Steps Down To Lead Presidential Science Advisory

        March 31, 2026

        Another Billionaire Signals Exit As California’s Taxes Drives Out High-Profile Entrepreneurs

        March 28, 2026

        Bezos Eyes $100 Billion War Chest To Rewire Legacy Industry With AI

        March 28, 2026
      TallwireTallwire
      Home»Tech»Phoenix Attack: New RowHammer Variant Exposes DDR5 Memory to Rapid Breach
      Tech

      Phoenix Attack: New RowHammer Variant Exposes DDR5 Memory to Rapid Breach

      Updated:December 25, 20254 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Phoenix Attack: New RowHammer Variant Exposes DDR5 Memory to Rapid Breach
      Phoenix Attack: New RowHammer Variant Exposes DDR5 Memory to Rapid Breach
      Share
      Facebook Twitter LinkedIn Pinterest Email

      A recent discovery dubbed Phoenix (CVE-2025-6202) shows that modern DDR5 memory modules—specifically those made by SK Hynix between 2021 and 2024—are more vulnerable than previously thought. Researchers from ETH Zürich and Google reverse-engineered the in-DRAM protections SK Hynix had built in and found gaps in the “Target Row Refresh” (TRR) mechanisms: certain refresh intervals were not sampled, allowing attackers to self-correct and synchronize memory hammering and trigger bit flips. In tests, Phoenix was able to bypass all known mitigations and gain root access on a standard desktop system in about 109 seconds under default settings. It also succeeded in stealing RSA-2048 keys from a co-located virtual machine and altering privilege boundaries via sudo. While the only temporary defense is increasing DRAM refresh rates (3× the normal rate, which carries performance penalties), the deeper conclusion is that future DRAM designs need stronger, more principled mitigations such as per-row activation counters to be secure. 

      Sources: ComSec.ethz.ch, Hacker News

      Key Takeaways

      – Existing Mitigations Are Not Enough: Standard protections like on-die ECC and advanced TRR schemes in SK Hynix DDR5 modules still leave blind spots that can be exploited by the Phoenix attack. 

      – Serious Real-World Impact: Attackers can escalate privileges, access sensitive keys (e.g. RSA-2048), or fully compromise systems in under two minutes using commodity hardware with default settings. 

      – Mitigations Trade Off Performance, and New Designs Needed: Increasing refresh rates helps mitigate Phoenix but with performance and stability costs. Long-term safety requires redesigning DRAM defenses (e.g. per-row activation counting) rather than relying on band-aid fixes. 

      In-Depth

      The Phoenix discovery marks a troubling new chapter in hardware security vulnerabilities. For years, RowHammer has been a known threat: the ability to repeatedly access (or “hammer”) a row of DRAM cells to induce bit flips in adjacent rows has been demonstrated since 2014, mostly in DDR3 and DDR4 devices. Over time, vendors added mitigations—error-correcting code (ECC), Target Row Refresh (TRR), and other refresh rate adjustments—to make these attacks harder. Until recently, DDR5 was thought to be more resilient thanks to improved internal refresh management and denser protection schemes. But Phoenix reveals that the guardrails are not impermeable.

      Researchers from ETH Zürich and Google systematically reverse-engineered the TRR mechanisms inside SK Hynix DDR5 modules and saw that while many intervals were protected, some refresh intervals were not sampled—those blind spots are where Phoenix finds its entry. The attack operates by keeping track of thousands of refresh operations. When a missed refresh interval (i.e. a gap in the protection coverage) is detected, the attack self-corrects and hammers at precisely the moments needed. Across their test pool—15 SK Hynix DDR5 DIMMs made between 2021 and 2024—they triggered bit flips in all of them. What’s worse, they didn’t just produce bit flips: they converted them into practical exploits, including root escalation in minutes under default settings, stealing RSA keys, and altering system binaries like sudo.

      The implications are broad. For users and system builders, the short-term remedy is painful: increase refresh rates to triple standard rates. This makes Phoenix much harder to execute, but at a cost—higher power usage, possible instability, and performance drops. For chip manufacturers and the hardware security community, the Phoenix attack underlines that incremental mitigations are no substitute for robust design: mechanisms such as per-row activation counters that give strong guarantees of protection will likely become essential. As DRAM geometries shrink and modules pack more densely, electrical interference between memory cells will only become harder to manage; attacks like Phoenix may be a harbinger of more to come rather than an isolated anomaly. Maintaining trust in system memory security now depends on both software (firmware/BIOS updates) and hardware evolution.

      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticlePhishers Hijack iCloud Calendar Invites to Mask Callback Scams Using Apple & Microsoft Infrastructure
      Next Article Photoshop Beta Now Lets You Pick Google’s Viral ‘Nano Banana’ Model for Generative Fill

      Related Posts

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      NASA Astronauts Use iPhones to Capture Historic Artemis II Mission Images

      April 8, 2026

      OpenAI Expands Influence With Strategic TBPN Media Acquisition

      April 8, 2026

      Cybersecurity Veteran Turns Focus To Drone Hacking After Decades Battling Malware

      April 6, 2026

      Anonymous Social App Surges In Saudi Arabia, Testing Limits Of Digital Freedom

      April 6, 2026
      Popular Topics
      Samsung UAE Tech Quantum computing Startup Sam Altman Ransomware trending Viral Sundar Pichai Tesla SpaceX Software Taiwan Tech Tesla Cybertruck Series B Satya Nadella Tim Cook spotlight Series A Robotics
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.