Researchers at ETH Zurich have introduced Phoenix, a novel Rowhammer attack targeting DDR5 memory that can manipulate data, steal encryption keys, and escalate privileges by exploiting weaknesses in the memory's TRR mechanism. This attack highlights ongoing vulnerabilities in memory security despite manufacturer defenses and emphasizes the need for improved countermeasures. The study also underscores that Rowhammer attacks remain a significant threat across different generations of memory modules.
Researchers from ETH Zurich and Google have developed a new Rowhammer attack variant named Phoenix, which successfully bypasses DDR5 memory chip protections, allowing attackers to flip bits and escalate privileges. Despite defenses like Target Row Refresh (TRR), the attack exploits specific refresh intervals, demonstrating vulnerabilities across all tested DDR5 memory modules. The findings highlight a critical security risk affecting DIMM RAM produced from 2021 to 2024, with practical implications for data integrity and system security.