Apple chips can be hacked to leak secrets from Gmail, iCloud, and more

May Be Interested In:UK may need fewer regulators, business secretary suggests



Apple-designed chips powering Macs, iPhones, and iPads contain two newly discovered vulnerabilities that leak credit card information, locations, and other sensitive data from the Chrome and Safari browsers as they visit sites such as iCloud Calendar, Google Maps, and Proton Mail.

The vulnerabilities, affecting the CPUs in later generations of Apple A- and M-series chip sets, open them to side channel attacks, a class of exploit that infers secrets by measuring manifestations such as timing, sound, and power consumption. Both side channels are the result of the chips’ use of speculative execution, a performance optimization that improves speed by predicting the control flow the CPUs should take and following that path, rather than the instruction order in the program.

A new direction

The Apple silicon affected takes speculative execution in new directions. Besides predicting control flow CPUs should take, it also predicts the data flow, such as which memory address to load from and what value will be returned from memory.

The most powerful of the two side-channel attacks is named FLOP. It exploits a form of speculative execution implemented in the chips’ load value predictor (LVP), which predicts the contents of memory when they’re not immediately available. By inducing the LVP to forward values from malformed data, an attacker can read memory contents that would normally be off-limits. The attack can be leveraged to steal a target’s location history from Google Maps, inbox content from Proton Mail, and events stored in iCloud Calendar.

SLAP, meanwhile, abuses the load address predictor (LAP). Whereas LVP predicts the values of memory content, LAP predicts the memory locations where instruction data can be accessed. SLAP forces the LAP to predict the wrong memory addresses. Specifically, the value at an older load instruction’s predicted address is forwarded to younger arbitrary instructions. When Safari has one tab open on a targeted website such as Gmail, and another open tab on an attacker site, the latter can access sensitive strings of JavaScript code of the former, making it possible to read email contents.

share Share facebook pinterest whatsapp x print

Similar Content

Meryl Streep cut a 'car-sized hole' in fence during frightening escape wildfires
Meryl Streep cut a ‘car-sized hole’ in fence during frightening escape wildfires
A unique spin on the classic holiday eggnog
A unique spin on the classic holiday eggnog
Syntilay Shoes
Are these AI-designed shoes the future of footwear?
Images of the awardees of the NASA Ames Research Center award Stars of the Month, pictured from right to left: Maurice Valdez, Niki Parenteau, Dori Myer, and Judy Alfter.
NASA Ames Stars of the Month: January 2025 – NASA
Jarnail Singh Bhindranwale in Amritsar in April 1984. Pic: AP
Sikh group ‘disappointed’ at Labour’s silence on 1984 Golden Temple massacre inquiry despite Starmer promise
Father John Misty, Sharon Van Etten and Caribou to play End Of The Road 2025
Father John Misty, Sharon Van Etten and Caribou to play End Of The Road 2025
The News Revolution: Where the World Connects | © 2025 | Daily News