New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution
AI Analysis
Technical Summary
The WireTap attack is a novel physical side-channel attack demonstrated by researchers from Georgia Institute of Technology and Purdue University that targets Intel's Software Guard Extensions (SGX) on DDR4 memory systems. SGX is a hardware-based Trusted Execution Environment (TEE) designed to protect sensitive code and data by isolating it within secure enclaves, even if the operating system is compromised. WireTap exploits the deterministic encryption scheme Intel uses for memory encryption, which lacks integrity and replay protections, by inserting a low-cost interposer device between the CPU and DDR4 memory modules. This interposer passively monitors and records all memory traffic, allowing attackers to extract the SGX Quoting Enclave's ECDSA attestation key. With this key, attackers can forge SGX enclave reports, effectively impersonating genuine SGX hardware and bypassing enclave confidentiality and integrity protections. The attack is similar in concept to the previously disclosed Battering RAM attack but focuses on confidentiality rather than integrity. The WireTap setup costs approximately $1,000, including a logic analyzer, and requires physical access to the target hardware, which could be achieved via supply chain compromise or direct physical tampering. The attack threatens SGX-backed applications, including blockchain networks like Phala Network and Secret Network, by exposing confidential transactions and enabling unauthorized transaction rewards. Intel states that this attack falls outside their threat model because it assumes physical access and does not plan to issue patches or CVEs. The research highlights fundamental limitations in Intel's AES-XTS based memory encryption, which provides limited confidentiality and no integrity or anti-replay protections against physical adversaries.
Potential Impact
For European organizations, the WireTap attack poses a significant risk to the confidentiality and integrity of sensitive workloads running within Intel SGX enclaves, especially in sectors relying on confidential computing and blockchain technologies. Organizations using SGX for secure key management, confidential data processing, or blockchain transaction validation could face data breaches, unauthorized data disclosure, and fraudulent transaction signing. The attack undermines trust in SGX-based attestation, potentially impacting cloud service providers offering SGX-backed services and enterprises deploying SGX-enabled applications. The requirement for physical access limits the attack to environments with inadequate physical security controls, such as data centers with lax access policies or supply chains vulnerable to hardware tampering. The inability of Intel to patch this vulnerability means organizations must rely on operational security measures. This threat could disrupt European blockchain initiatives and confidential computing deployments, eroding confidence in these technologies and potentially causing financial and reputational damage.
Mitigation Recommendations
European organizations should implement stringent physical security controls around servers and hardware hosting SGX-enabled applications, including restricted access, surveillance, and tamper-evident seals. Supply chain security must be enhanced to prevent insertion of malicious interposers during manufacturing, shipping, or maintenance. Deployments should consider hardware attestation mechanisms beyond SGX or use complementary security technologies that provide integrity and replay protections. Network segmentation and monitoring can help detect anomalous behaviors indicative of compromised SGX enclaves. Organizations should evaluate the risk of using SGX for critical workloads and consider alternative trusted execution environments or software-based protections where physical security cannot be guaranteed. Cloud providers offering SGX services should transparently communicate their physical security measures and consider additional hardware protections. Finally, regular security audits and penetration testing focusing on physical attack vectors are essential to identify and remediate vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Estonia, Luxembourg
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
Description
In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data. SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution
AI-Powered Analysis
Technical Analysis
The WireTap attack is a novel physical side-channel attack demonstrated by researchers from Georgia Institute of Technology and Purdue University that targets Intel's Software Guard Extensions (SGX) on DDR4 memory systems. SGX is a hardware-based Trusted Execution Environment (TEE) designed to protect sensitive code and data by isolating it within secure enclaves, even if the operating system is compromised. WireTap exploits the deterministic encryption scheme Intel uses for memory encryption, which lacks integrity and replay protections, by inserting a low-cost interposer device between the CPU and DDR4 memory modules. This interposer passively monitors and records all memory traffic, allowing attackers to extract the SGX Quoting Enclave's ECDSA attestation key. With this key, attackers can forge SGX enclave reports, effectively impersonating genuine SGX hardware and bypassing enclave confidentiality and integrity protections. The attack is similar in concept to the previously disclosed Battering RAM attack but focuses on confidentiality rather than integrity. The WireTap setup costs approximately $1,000, including a logic analyzer, and requires physical access to the target hardware, which could be achieved via supply chain compromise or direct physical tampering. The attack threatens SGX-backed applications, including blockchain networks like Phala Network and Secret Network, by exposing confidential transactions and enabling unauthorized transaction rewards. Intel states that this attack falls outside their threat model because it assumes physical access and does not plan to issue patches or CVEs. The research highlights fundamental limitations in Intel's AES-XTS based memory encryption, which provides limited confidentiality and no integrity or anti-replay protections against physical adversaries.
Potential Impact
For European organizations, the WireTap attack poses a significant risk to the confidentiality and integrity of sensitive workloads running within Intel SGX enclaves, especially in sectors relying on confidential computing and blockchain technologies. Organizations using SGX for secure key management, confidential data processing, or blockchain transaction validation could face data breaches, unauthorized data disclosure, and fraudulent transaction signing. The attack undermines trust in SGX-based attestation, potentially impacting cloud service providers offering SGX-backed services and enterprises deploying SGX-enabled applications. The requirement for physical access limits the attack to environments with inadequate physical security controls, such as data centers with lax access policies or supply chains vulnerable to hardware tampering. The inability of Intel to patch this vulnerability means organizations must rely on operational security measures. This threat could disrupt European blockchain initiatives and confidential computing deployments, eroding confidence in these technologies and potentially causing financial and reputational damage.
Mitigation Recommendations
European organizations should implement stringent physical security controls around servers and hardware hosting SGX-enabled applications, including restricted access, surveillance, and tamper-evident seals. Supply chain security must be enhanced to prevent insertion of malicious interposers during manufacturing, shipping, or maintenance. Deployments should consider hardware attestation mechanisms beyond SGX or use complementary security technologies that provide integrity and replay protections. Network segmentation and monitoring can help detect anomalous behaviors indicative of compromised SGX enclaves. Organizations should evaluate the risk of using SGX for critical workloads and consider alternative trusted execution environments or software-based protections where physical security cannot be guaranteed. Cloud providers offering SGX services should transparently communicate their physical security measures and consider additional hardware protections. Finally, regular security audits and penetration testing focusing on physical attack vectors are essential to identify and remediate vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html","fetched":true,"fetchedAt":"2025-10-07T01:05:09.300Z","wordCount":1203}
Threat ID: 68e467476a45552f36e85b7f
Added to database: 10/7/2025, 1:05:11 AM
Last enriched: 10/7/2025, 1:10:10 AM
Last updated: 11/20/2025, 4:38:11 PM
Views: 330
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-31405
LowCVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR
LowVulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
LowCVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-64757: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in withastro astro
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.