• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Hackers Innovate Way to Store and Execute Malware from Video Memory to Evade Anti-Malware

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,683 (7.42/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Cybercriminals have innovated a way to store malware code inside GPU dedicated memory (video memory), and execute code directly from there. Execution from video memory may not be new, but they've mostly been confined to the academic space, and unrefined. This would be the first time a proof-of-concept of a working tool that injects executables to video memory, surfaced on a hacker forum.

The tool relies on OpenCL 2.0, and its developers claim to have successfully tested it on Intel Gen9, AMD RDNA, NVIDIA Kepler, and NVIDIA Turing graphics architectures (i.e. UHD 620, UHD 630, Radeon RX 5700, GeForce GTX 740M, and GTX 1650). What makes this ingenious is that the malware binary is stored entirely in GPU memory address-space and is executed by the GPU, rather than the CPUs. Conventional anti-malware software are only known to scan the system memory, disks, and network traffic for malware; but not video memory. Hopefully this will change.



View at TechPowerUp Main Site
 
henceforth nothing made to this day will meet the requirements of windows 11, cannot be too careful !!
 
Directstorage is coming and that will make easier for this hack to work.
 
Any microchip can be a malware if you are brave enough...
 
How do windows 11 users fare?
 
Cybercriminals have innovated a way to store malware code inside GPU dedicated memory (video memory), and execute code directly from there.
I've wondered if that would work for decades, guess we have an answer now. THIS will piss a few people off!

The hackers might be twots, but no denying they are clever.
True!

I was reading somewhere they could store and execute malware from TPM....
Yuppers. It takes some doing but can be done. This is also why TPM is useless outside of a certain usage context and why microsoft requiring it for Windows 11 is as pointless as it is transparent.
 
Proof-of-concept has been known for years, but there really wasn't much need for it given the simpler alternatives available.
I've wondered if that would work for decades, guess we have an answer now. THIS will piss a few people off!

Eventually we're all going to be using AV programs running mirrors of our system on virtual machines because sometimes the only way to detect this stuff is by identification through its behavior(dynamic analysis).

Until countries band together and agree to start tracking down and putting bullets into the heads of individuals that do this kind of stuff, its just going to continue.
 
I was reading somewhere they could store and execute malware from TPM....
First I've heard of it. Malware can use the TPM to store keys away from the user, but it can't run from it.
 
Even NIC's have some sort of firmware and write-enabled memory.

Usually all firmware have some interface for writing things in its memory. Also, usually vendors rely on non-documented interfaces or ones that are under NDA with the OEM/ODM, i.e. bad for us.

There are so many places to hide malware or exploit freely writeable memory that I get the hibbidyjibbies just thinking about it.

Proof-of-concept has been known for years, but there really wasn't much need for it given the simpler alternatives available.


Eventually we're all going to be using AV programs running mirrors of our system on virtual machines because sometimes the only way to detect this stuff is by identification through its behavior(dynamic analysis).

Until countries band together and agree to start tracking down and putting bullets into the heads of individuals that do this kind of stuff, its just going to continue.
Complete virtualization and isolation, in combination with dynamic root of trust can solve 99% (or maybe around 95%?) of all problems.

It's not yet implemented because it is expensive and has a significant performance hit. Also, very few SOHO users demand it. Enterprises already run almost everything on some form of (somewhat) secure virtualization platform.
 
Until countries band together and agree to start tracking down and putting bullets into the heads of individuals that do this kind of stuff, its just going to continue.
Forget about that, that's were everyone get their security operators/advisors/hackers for their own interests. It's the same as demilitarizing, should be the common goal, no ones does because of what others might do.
 
Takes buying an open box or used GPU to a whole different level. :laugh:
 
Back
Top