Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsOld Attack, New Speed: Researchers Optimize Page Cache Exploits
Old Attack, New Speed: Researchers Optimize Page Cache Exploits
Cybersecurity

Old Attack, New Speed: Researchers Optimize Page Cache Exploits

•January 22, 2026
0
SecurityWeek
SecurityWeek•Jan 22, 2026

Companies Mentioned

Docker

Docker

Discord

Discord

Why It Matters

The speed improvement makes page‑cache side‑channel attacks feasible for real‑world malware, jeopardizing credential security and container isolation across Linux deployments.

Key Takeaways

  • •New Linux page‑cache attacks run in sub‑microsecond range
  • •Flushing latency dropped from 149 ms to 0.8 µs
  • •Attacks enable precise credential harvesting and container spying
  • •Only CVE‑2025‑21691 patched; many vectors remain unaddressed
  • •Researchers revived 2019 techniques with dramatically higher speed

Pulse Analysis

The page cache, a core component of modern operating systems, stores recently accessed file‑backed pages to accelerate I/O operations. While its performance benefits are well known, security researchers have long recognized that the cache can leak timing information. In 2019, academic teams demonstrated proof‑of‑concept attacks on both Windows and Linux, but the high latency of cache‑flush operations—on the order of hundreds of milliseconds—limited practical exploitation. The new study from TU Graz shatters that barrier, showing flush times of 0.8 µs and full attack loops completing within 2 µs, a speedup of five to six orders of magnitude.

This dramatic acceleration expands the realistic threat surface for unprivileged malware. Attackers can now monitor the presence of specific binaries or libraries with microsecond precision, enabling synchronized phishing overlays, real‑time key‑logging, and inter‑keystroke timing attacks that recover passwords. In containerized environments, a compromised container can observe the page‑cache activity of neighboring containers, breaking the isolation guarantees that Docker and Kubernetes rely on. Even user‑level applications such as browsers or communication tools become observable, allowing adversaries to infer visited websites or voice‑channel participation without touching network traffic.

Only a single vulnerability, CVE‑2025‑21691, has been patched since the findings were disclosed, leaving most of the attack surface exposed in current Linux kernels. Mitigation strategies include disabling page‑cache timing channels, tightening container isolation, and deploying kernel hardening patches that randomize cache eviction. Security teams should prioritize monitoring for anomalous cache‑flush patterns and consider integrating hardware‑based side‑channel defenses. As researchers continue to refine microarchitectural exploits, the industry must treat page‑cache side channels with the same urgency as Spectre‑type vulnerabilities to protect enterprise workloads.

Old Attack, New Speed: Researchers Optimize Page Cache Exploits

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...