Apple Users Beware: Reported Flaw Exposes Mac Users Crypto Private Keys
Apple’s hardware security faces a critical flaw that allows malicious entities to extract sensitive information.
A recent study has raised alarms after identifying a vulnerability in Apple’s M-series chips that has the potential to enable hackers to retrieve the cryptographic private keys of Mac users.
In the absence of a direct resolution, the other method suggested by researchers may drastically hamper performance.
Apple M-Series Chips Susceptible to Key Extraction
The vulnerability in question functions as a side channel, thereby permitting the extraction of end-to-end keys when Apple chips execute implementations of commonly employed cryptographic protocols. Due to its origin in the microarchitectural structure of the silicon, direct patching is not feasible, unlike traditional vulnerabilities.
Instead, the report highlighted a fix that relies on integrating defenses into third-party cryptographic software. However, this approach may significantly, “degrade” the performance of M-series chips during cryptographic tasks, especially evident in earlier generations like M1 and M2.
The researchers also added that the exploitation of the vulnerability occurs when both the targeted cryptographic operation and a malicious application, operating with standard user system privileges, are processed on the same CPU cluster.
“Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate.”
The latest research sheds light on, what is being toouted as, an overlooked phenomenon regarding DMPs within Apple silicon. In certain cases, these DMPs misinterpret memory content, including critical key material, as the pointer value utilized for loading other data. As a result, the DMP frequently accesses and interprets this data as an address, leading to memory access attempts, the team of researchers explained.
This process, known as “dereferencing” of “pointers,” entails reading data and inadvertently leaking it through a side channel, representing a clear breach of the constant-time paradigm.
GoFetch
The researchers identified this hack as a “GoFetch” exploit while explaining that it operates on the same user privileges as most third-party applications, exploiting vulnerabilities in clusters of M-series chips. It affects classical and quantum-resistant encryption algorithms alike, with extraction times varying from minutes to hours depending on the key size.
Despite previous knowledge of similar threats, the researchers said that GoFetch demonstrates a more aggressive behavior in Apple’s chips, posing a significant security risk.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Polygon Targets $1 & Ethereum Eyes $3,600, Yet BlockDAG’s CertiK Audit and $0.0019 Coins Could Outperform All
Discover Polygon (POL) price movement and Ethereum (ETH) price analysis as both eye breakouts, and see why BlockDAG’s CertiK audit, growing presale, and attractive pricing position it among the best crypto for higher returns in 2025.Polygon (POL) Price Movement Signals Breakout Toward $1Ethereum (ETH) Price Analysis: Tight Range Could Spark $3,600 BreakoutBlockDAG’s CertiK Audit Strengthens Its Case as the Best Crypto for Higher ReturnsTo Sum It Up

$298M Crypto Liquidations Rock BTC and ETH Traders
Crypto liquidations hit $298M in 24 hours, with BTC and ETH leading losses. Here's what caused the wipeout.A Rough Day for Crypto TradersWhat Triggered the Liquidations?Caution Ahead for Leverage Users

Top New Meme Coins to Invest in This Month: Troller Cat Flaunts 7k% ROI as Official Trump and Mog Coin Rise from Slumber
Troller Cat ignites excitement with 69% APY and 7,000% ROI target. TRUMP and MOG bounce back, but is this cat the real jackpot?Troller Cat ($TCAT): Clawing Up the Ladder with Massive ROI PotentialOfficial Trump ($TRUMP): Slow Grind with Political BuzzMog Coin ($MOG): The Cult Favorite Gets a PulseConclusion

SOL Technical Analysis Signals Strength, Cardano’s AI Testnet Launches & BlockDAG’s $0.0019 Offer Ends on May 13
Explore SOL Technical Analysis & details on Cardano's AI Testnet. See why BlockDAG’s $0.0019 entry before May 13 could define the best crypto platform call.SOL Technical Analysis Points to Cautious OptimismCardano’s AI Testnet to Simulate High-Frequency Network ConditionsBlockDAG’s Listings Near: $0.0019 Offer Available Until May 13What Defines the Best Crypto Platform in 2025?

Trending news
MoreCrypto prices
More








