{"id":43961,"date":"2021-11-16T15:27:08","date_gmt":"2021-11-16T15:27:08","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32827\/This-New-Attack-Bypasses-Rowhammer-Defenses-In-Most-DRAM-Say-Researchers.html"},"modified":"2021-11-16T15:27:08","modified_gmt":"2021-11-16T15:27:08","slug":"this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/","title":{"rendered":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers have revealed a new type of Rowhammer attack on DRAM devices that can reliably bypass mitigations implemented by vendors after the first such attacks emerged in 2014.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>Data in Dynamic DRAM (DRAM) is stored in grids of memory. Rowhammer attacks work by rapidly and repeatedly reading data in one memory row to cause an electrical charge in adjacent memory rows in order to modify or corrupt data.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/#link=%7B%22role%22:%22standard%22,%22href%22:%22http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EA%20winning%20strategy%20for%20cybersecurity%3C\/strong%3E%22%7D\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong> (ZDNet special report)<\/strong><\/p>\n<p>The latest Rowhammer attack seeks to bypass Target Row Refresh (TRR) mitigations that the DRAM industry added to modern RAM cards in response to the first Rowhammer attack in 2014.&nbsp;<\/p>\n<p>The researchers from ETH Zurich, Vrije Universiteit Amsterdam, and Qualcomm ran their attack \u2013 via a fuzzer called&nbsp;<a href=\"https:\/\/github.com\/comsec-group\/blacksmith\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Blacksmith, available on GitHub<\/a>&nbsp;\u2013 against various proprietary TRR implementations in 40 DRAM devices. The technique allowed them to quickly discover ways to cause bit flips in all of them.&nbsp;<\/p>\n<p>&#8220;This result has a significant impact on the system&#8217;s security as DRAM devices in the wild cannot easily be fixed, and previous work showed real-world Rowhammer attacks are practical, for example, in the browser using JavaScript, on smartphones, across VMs in the cloud, and even over the network,&#8221; the group said.<\/p>\n<p>&#8220;All currently deployed mitigations are insufficient to fully protect against Rowhammer. Our novel patterns show that attackers can more easily exploit systems than previously assumed,&#8221; they warned.<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>The 40 devices were from memory vendors Samsung, Micron, SK Hynix, as well as two more vendors that didn&#8217;t agree to have their names published in the research.&nbsp; &nbsp; &nbsp;&nbsp;<\/p>\n<p>&#8220;TRR aims to detect rows that are frequently accessed (i.e., hammered) and refresh their neighbors before their charge leak results in data corruptions,&#8221; <a href=\"https:\/\/comsec.ethz.ch\/wp-content\/files\/blacksmith_sp22.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the researchers explain in a new paper<\/a>.&nbsp;<\/p>\n<p>While TRR for the most part works when detecting even multiple aggressor rows being hammered frequently, the researchers note that past Rowhammer attacks &#8220;always access aggressors uniformly&#8221;. &nbsp;<\/p>\n<p>TRR in this sense does create a cost problem for attackers because the space to search for non-uniform patterns that can bypass the mitigation is &#8220;huge&#8221;, the researchers explain. Their answer was to run the Blacksmith fuzzer for 12 hours on sampled DDR4 DRAM devices in order to discover and build non-uniform patterns that expose weaknesses in TRR implementations designed to look for various uniform patterns.&nbsp;<\/p>\n<p>&#8220;Thereafter, we <em>swept<\/em> the best pattern (based on the number of total bit flips triggered) over a contiguous memory area of 256 MB and report the number of bit flips,&#8221; <a href=\"https:\/\/comsec.ethz.ch\/research\/dram\/blacksmith\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">they explain in a blogpost<\/a>.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.zdnet.com\/article\/this-mysterious-malware-could-threaten-millions-of-routers-and-iot-devices\/\" target=\"_blank\" rel=\"noopener\">This mysterious malware could threaten millions of routers and IoT devices<\/a><\/strong><\/p>\n<p>The technique enabled them to use these non-standard patterns to trigger bit flips in all 40 DRAM devices. In some cases, the technique uncovered several thousand bit flips within seconds.<\/p>\n<p>This type of Rowhammer attack targeting TRR is likely to get more powerful in future. The group says it is working with Google to fully integrate the Blacksmith fuzzer into an open-source FPGA Rowhammer-testing platform.&nbsp;<\/p>\n<p>The researchers&#8217; findings are being tracked as CVE-2021-42114. The researchers have discussed their findings with Intel and Google, which separately this week launched a new open-source Rowhammer Tester platform.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32827\/This-New-Attack-Bypasses-Rowhammer-Defenses-In-Most-DRAM-Say-Researchers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8914],"class_list":["post-43961","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinedata-lossflawintel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-16T15:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers\",\"datePublished\":\"2021-11-16T15:27:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/\"},\"wordCount\":550,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bd5c18cb22378143bd877323178922394c5173ec\\\/2021\\\/11\\\/16\\\/437df6d3-786b-4f3b-8404-a8fec8f7f783\\\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"keywords\":[\"headline,data loss,flaw,intel\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/\",\"name\":\"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bd5c18cb22378143bd877323178922394c5173ec\\\/2021\\\/11\\\/16\\\/437df6d3-786b-4f3b-8404-a8fec8f7f783\\\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-11-16T15:27:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bd5c18cb22378143bd877323178922394c5173ec\\\/2021\\\/11\\\/16\\\/437df6d3-786b-4f3b-8404-a8fec8f7f783\\\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bd5c18cb22378143bd877323178922394c5173ec\\\/2021\\\/11\\\/16\\\/437df6d3-786b-4f3b-8404-a8fec8f7f783\\\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,data loss,flaw,intel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinedata-lossflawintel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/","og_locale":"en_US","og_type":"article","og_title":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-16T15:27:08+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers","datePublished":"2021-11-16T15:27:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/"},"wordCount":550,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","keywords":["headline,data loss,flaw,intel"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/","url":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/","name":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-11-16T15:27:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bd5c18cb22378143bd877323178922394c5173ec\/2021\/11\/16\/437df6d3-786b-4f3b-8404-a8fec8f7f783\/shutterstock-401334937.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-new-attack-bypasses-rowhammer-defenses-in-most-dram-say-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,data loss,flaw,intel","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinedata-lossflawintel\/"},{"@type":"ListItem","position":3,"name":"This New Attack Bypasses Rowhammer Defenses In Most DRAM, Say Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43961"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43961\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}