New Attack Targets Ddr5 Memory to Steal Keys From Intel and Amd Tees
Posted2 months agoActive2 months ago
securityweek.comTechstory
calmnegative
Debate
0/100
Ddr5 MemorySide-Channel AttackHardware Security
Key topics
Ddr5 Memory
Side-Channel Attack
Hardware Security
A new attack targets DDR5 memory to steal encryption keys from Intel and AMD systems, highlighting a potential vulnerability in modern hardware.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
33m
Peak period
1
0-1h
Avg / period
1
Key moments
- 01Story posted
Oct 29, 2025 at 9:34 AM EDT
2 months ago
Step 01 - 02First comment
Oct 29, 2025 at 10:08 AM EDT
33m after posting
Step 02 - 03Peak activity
1 comments in 0-1h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 29, 2025 at 10:08 AM EDT
2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45746640Type: storyLast synced: 11/17/2025, 8:08:24 AM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
That situation may not remain for long however. I am reminded of the parity chip scam where a specialized chip was integrated onto DRAM boards to make them appear to have parity-checking RAM onboard when there wasn't (parity RAM was considerably more expansive). Moreover, unless one was in the know and knew exactly what to look for on the PWA one could easily be fooled.
Little doubt in time that trick will be tried again here (damned pain when electronic components now have to be tracked and authenticated from manufacture to end use in the way aircraft parts and nuclear materials are managed).