
Related





Apple the world’s most valuable brand… again
22 Jan 2025

#BizTrends2025: Finding cybersecurity's place in the world
Gerhard Swart 13 Jan 2025


Why does it matter? If successful, GoFetch could allow hackers to extract secret login details and other highly secure information from your Mac. The exploit targets the CPU’s on-chip data memory-dependent prefetcher (DMP) and is relatively unfixable on older processors.
How difficult is it? While serious, it's not a simple attack. It takes significant technical skill and the ability to run a malicious program on your device.
Memory hunt Apple’s M-series processors try to be helpful by predicting what data you might need next and loading it in advance. GoFetch exploits this feature.
Hunting for secrets The attack program looks for patterns in this pre-loaded data, things that resemble the way secure cryptographic keys (think of them like ultra-complex passwords) are constructed.
Timing is everything GoFetch uses precise timing measurements to extract bits and pieces of those security keys, essentially piecing them together over time.
While the GoFetch attack can potentially extract cryptographic keys from systems using Apple CPUs, it doesn’t directly relate to the functionality of Touch ID. There’s also no information available that suggests the GoFetch attack can be used to bypass Apple ID authentication or break into a Mac.
The flaw is specific to Apple's M1-series and A14 chips, so Intel-based Macs and other devices aren't affected.
The attack needs a malicious program running directly on your Mac. This isn't something that can easily happen remotely.
This isn't something the average person needs to lose sleep over, but staying vigilant is always wise. IT departments overseeing enterprise Mac fleets, however, should caution users about malicious actors.
While the vulnerability is tied to hardware function and design, Apple is likely working on a fix for the M3 processors – which can have the DMP turned off. Users should install security updates as soon as possible.
Avoid downloading software from dodgy sources or opening suspicious attachments – basic cybersecurity is still key.
If you handle particularly sensitive information on your Mac, consulting a cybersecurity expert might provide peace of mind.
GoFetch is a reminder no device is completely invulnerable. Awareness and smart practices are your best defence.