Security Vulnerability in Apple's M-Series Chips Puts Mac Users' Crypto Private Keys at Risk (2024)

Security Vulnerability in Apple's M-Series Chips Puts Mac Users' Crypto Private Keys at Risk (2)

Researchers have uncovered a significant security vulnerability in Apple’s M-series chips, raising concerns about the safety of crypto private keys stored on Mac computers.

According to a recentreport, the vulnerability, a side-channel exploit, allows malicious actors to extract encryption keys while the Apple chips are executing commonly used cryptographic protocols.

Unlike typical vulnerabilities that can be addressed through software patches, this particular flaw resides in the microarchitectural design of the chips themselves, rendering it “unpatchable.”

To mitigate the issue, third-party cryptographic software would need to be employed, but this could severely impact the performance of earlier M-series chips, including the M1 and M2.

Fundamental Weakness in Apple’s M-Series Chips Security Poses Threat to Crypto Holders


The findings shed light on a fundamental weakness in Apple’s hardware security infrastructure.

Hackers can intercept and exploit memory access patterns to gain unauthorized access to sensitive information, including encryption keys utilized by cryptographic applications.

The researchers have given this type of attack the name “GoFetch” exploit, which operates seamlessly within the user environment and requires standard user privileges like regular applications.

Following the disclosure of this research, Mac users in online forums have expressed concerns and raised questions about the potential impact on password keychains.

Some users believe that Apple will address the problem directly within its operating system, while others express greater worry if the company fails to do so.

One user pointed out that Apple might already be aware of this flaw, speculating that the upcoming M3 chip includes an additional instruction to disable the vulnerable feature.

They referred to previous research on the topic, known as “augury,” dating back to 2022.

Apple Faces DOJ Lawsuit


This discovery adds to the mounting challenges faced by Apple, including an ongoing antitrust lawsuit filed by the US Department of Justice (DOJ).

The lawsuit alleges that Apple’s rules for the App Store and its alleged monopoly have stifled competition and innovation.

The DOJ also claims that Apple has restricted access to competing digital wallets, which offer enhanced features, while preventing developers from offering their own payment services to users.

Last year, a class-action lawsuitwas filed against Apple, alleging that the tech giant has engaged in a conspiracy to limit peer-to-peer payment options on its devices and block the integration of crypto technology in iOS payment apps.

The complaint claimed that Apple entered into anti-competitive agreements with popular payment platforms such as PayPal’s Venmo and Block’s Cash App.

These agreements allegedly restrict the use of decentralized cryptocurrency technology in payment apps, resulting in inflated prices for users.

Furthermore, Apple’s guidelines require app developers to share 30% of transaction revenues.

This has been a barrier for crypto firms, including those facilitating the purchase of non-fungible tokens (NFTs), as they strive to provide services to iOS users.

Asreported, Apple has removed the Bitcoin-friendly social media app Damus from the App Store for violating its terms of service.

The app has a tipping feature that allows content creators to receive tips in the form of Bitcoin through the Lightning Network.

Apple deemed this feature a violation of its guidelines, as it prohibits developers from selling additional in-app content unless the transactions go through Apple, through which the tech giant takes a 30% cut.

Security Vulnerability in Apple's M-Series Chips Puts Mac Users' Crypto Private Keys at Risk (2024)

FAQs

Security Vulnerability in Apple's M-Series Chips Puts Mac Users' Crypto Private Keys at Risk? ›

Basically, the researchers discovered that the DMPs in Apple's Silicon chipsets – M1, M2 and, M3 – can give hackers access to sensitive information, like secret encryption keys. The DMPs can be weaponized to get around security found in cryptography apps, and they can do so quickly too.

What is the vulnerability in Apple M series chips? ›

The GoFetch vulnerability, which affects Apple's M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.

What is the Mac crypto vulnerability? ›

The new vulnerability is associated with a performance optimization feature called data memory-dependent prefetchers (DMP) in Apple's M1, M2, and M3 microprocessors, which are used to preemptively cache data; they allow the chip to anticipate the next bit of information that it will need to access, which speeds up ...

What is the problem with Apple M chip? ›

Apple's M-series of chips contain a flaw that could allow an attacker to trick the processor into revealing secret end-to-end encryption keys on Macs, according to new research.

Can hackers extract secret encryption keys from Apple Mac chips? ›

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations.

What is the Apple vulnerability? ›

The vulnerability allows attackers to execute arbitrary code remotely, posing a significant threat to users' security. As per the security advisory from CERT-In, the vulnerability affects a wide range of Apple software and hardware, including Apple Safari versions prior to 17.4.

What are Apple's M chips? ›

Apple introduced the M1 Ultra in 2022, a desktop workstation chip containing two interconnected M1 Max units. These chips differ largely in size and the number of functional units: for example, while the original M1 has about 16 billion transistors, the M1 Ultra has 114 billion.

Are Macs vulnerable to hackers? ›

It's often said that Macs can't be hacked but unfortunately, this isn't true. While Macs may not be compromised as frequently as Windows PCs, there have been various examples of hackers successfully targeting Macs, from fake programs to vulnerability exploits.

What are the vulnerabilities of macOS? ›

ProductVulnerability NameDetail Link
macOSApple macOS Out-of-Bounds Read VulnerabilityCVE-2022-22674
WebkitApple Webkit Remote Code Execution VulnerabilityCVE-2022-22620
OS XApple OS X Authentication Bypass VulnerabilityCVE-2015-1130
OS XApple OS X Heap-Based Buffer Overflow VulnerabilityCVE-2014-4404
42 more rows
Jun 16, 2023

How secure are Apple Macs? ›

Keep your Mac safe.

All Mac systems built on the Apple M1 chip or with the Apple T2 Security Chip support Activation Lock, just like your iPhone or iPad. So if your Mac is ever misplaced or lost, the only person who can erase and reactivate it is you.

What is the problem with Apple chips? ›

A group of researchers has found a serious security vulnerability in Apple's M-series of chips that would allow attackers to steal secret keys from Mac and iPad devices.

What are disadvantages of M1 chip? ›

It doesn't support an external GPU which means you will face a problem using it for gaming. The same is the case for more high-definition professional editing. Another disadvantage of the M1 chip is that it does not support multiple screen displays, and you have to manage with a single monitor only.

Which Apple M chip is better? ›

Under the hood is Apple's M3 chip. It offers a nice boost in performance over the original M1 processor—Apple says it's up to 60 times faster, but it's only 20 percent faster than the M2 chipset, so don't upgrade if you have that model.

How do private keys get compromised? ›

A private key is compromised when an unauthorized person obtains the private key or determines what the private key is that is used to encrypt and decrypt secret information. The compromised key can be used to decrypt encrypted data without the knowledge of the sender of the data.

Are private keys encrypted? ›

A private key is a cryptographic key used in an encryption algorithm to both encrypt and decrypt data. These keys are used in both public and private encryption: In private key encryption, also known as symmetric encryption, the data is first encrypted using the private key and then decrypted using the same key.

Can private keys be decrypted? ›

The only way to decrypt that private key is with the corresponding public key, which the recipient can access. By signing the message with the sender's private key, this guarantees for the recipient that the message really did come from the sender.

How secure is the M1 chip? ›

Researchers have reportedly found a vulnerability that affects Apple's M1 chip, which could allow hackers to eavesdrop on users' activities. The vulnerability is believed to allow attackers to extract secret keys from Macs during commonly used cryptographic operations.

What are the limitations of Apple M1 chip? ›

Limited Software Compatibility: One notable drawback of the M1 chip is its limited software compatibility with legacy applications designed for Intel-based Macs. While Apple's Rosetta 2 translation technology helps run some x86 applications, not all programs work seamlessly, potentially leading to user inconvenience.

What Apple devices are at risk of being hacked? ›

iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later. Apple Safari versions prior to 17.3. macOS Monterey and macOS Ventura.

Top Articles
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6247

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.