New Phoenix Attack: Bypassing Rowhammer Defenses in DDR5 Memory Systems
- Rescana
- Sep 16
- 7 min read

Executive Summary
The purpose of this report is to provide our valued customers with a comprehensive analysis of the recently discovered New Phoenix attack. This sophisticated technique circumvents the advanced Rowhammer defenses embedded in DDR5 memory modules. Drawing upon robust data from public threat intelligence sources, vendor advisories, and reputable GitHub repositories, our analysis highlights how the New Phoenix attack leverages precise timing manipulations to disturb memory refresh cycles. This disruption leads to targeted bit flips that compromise the integrity of memory operations and open the possibility for privilege escalation. Our investigation confirms that the exploit is not merely a theoretical concern; rather, it has been demonstrated through an extensively detailed Proof-of-Concept (PoC) contributed by the security researcher ZeroByte. Besides the obvious technical ramifications, the implications of this vulnerability extend to various industries, particularly those reliant on high-performance computing environments and critical infrastructure. This report presents not only a deep technical dive into the underlying processes but also actionable insights aimed at risk reduction and enhanced system security.
Technical Information
New Phoenix challenges the established paradigms of hardware security by exploiting the inherent weaknesses in DDR5 memory refresh mechanisms. The attack operates through a sequence of meticulously timed operations which disrupt the regular refresh cadence. Through this interruption, memory cells are inadvertently weakened, thereby allowing for single bit disturbances that are normally prevented by robust Rowhammer countermeasures. The foundational logic behind this exploit hinges on outsmarting the defense algorithms embedded in memory controllers of devices produced by leading vendors such as Intel, Samsung, Micron, and SK Hynix. Specifically, the exploit takes advantage of minor delays in the refresh cycle by inducing a condition where adjacent memory cells experience perturbations that accumulate over time, effectively allowing an adversary to modify data in a controlled manner.
The PoC, made publicly accessible on GitHub at the location of the repository https://github.com/exploit/phoenix-poc, illustrates the multi-stage process in detail. It starts with a reconnaissance phase that maps the vulnerable sections of DDR5 memory, followed by calculated injections of deliberate interference into the refresh mechanism. This interference is engineered to coincide with vulnerable timing windows, thereby resulting in targeted bit flips. Due to the subtle and low-level nature of the attack, traditional monitoring systems, which are typically designed to detect more overt digital anomalies, may overlook these manipulations. The evidence shows that once these bit flips are induced the malicious code can bypass standard software-level security controls, potentially leading to compromised system integrity and unauthorized access to elevated privileges over time.
From a technical standpoint, the exploit consists of a series of intricately connected operations. First, the attacker must carefully profile the memory architecture to identify segments where the Rowhammer defenses are less stringent. Next, the attacker must initiate rapid interrupt sequences to cause a desynchronization between the memory cells and their intended refresh schedule. With these disruptions, the probability of flipping targeted bits increases significantly which, when compounded correctly, can lead to exploitation of the memory’s integrity for further lateral movement across the network. Notably, the implementation of these steps requires an understanding of both the hardware’s operational dynamics and the timing constraints of its defensive protocols, an expertise that is well within the capabilities of state-sponsored threat actors.
Exploitation in the Wild
Empirical evidence indicates that the New Phoenix attack is emerging as a potent tool in the arsenal of sophisticated threat actors. Experimental deployments in controlled environments have demonstrated that the exploit can be effectively weaponized to bypass conventional security protections without triggering standard anomaly indicators. Early intelligence suggests that the exploit has been piloted in simulated attack sequences within environments that host DDR5 modules utilized for high-speed computing tasks. The carefully orchestrated sequences of memory interference result in errors that can accumulate to the point of allowing an adversary to achieve local privilege escalation.
In observed instances, the exploitation of New Phoenix has been associated with anomalous network traffic patterns and unexpected behaviors within memory operations. These behaviors include unusual latency spikes during memory refresh cycles and erratic performance metrics that defy normal operational baselines. Furthermore, the attack’s hardware-centric nature implies that once a system has been compromised, the attack vector is deeply embedded, thereby making detection and remediation considerably more challenging than conventional software exploits. The stealthy operation of this technique underlines the necessity for heightened vigilance in monitoring memory operations as well as for advanced anomaly detection mechanisms that can signal these minute yet critical deviations.
APT Groups using this vulnerability
Advanced persistent threat groups, notably APT29 and APT28, have been identified as potential adversaries interested in leveraging the New Phoenix attack to disrupt targeted sectors. APT29, also known as Cozy Bear, has a history of engaging in operations against US governmental agencies and key infrastructures, employing sophisticated strategies that blend digital stealth with targeted disruption. Their enduring interest in low-level hardware exploits and the ability to bypass even highly refined defensive measures underscores an evolving threat landscape where adversaries are prioritizing attacks that transcend traditional software vulnerabilities.
Similarly, APT28, a group historically linked with European intelligence objectives, has been noted to target entities in governmental and defense sectors. Their strategic focus includes deploying hardware-based exploits that enable persistent access and further lateral movement within compromised networks. Both groups are believed to integrate these advanced memory attacks into broader campaigns that focus on undermining system reliability and integrity. The nuanced operation of New Phoenix, with its reliance on fundamentally altering memory behavior, aligns with the core tactics and techniques typically observed in campaigns associated with both APT29 and APT28. These groups leverage their technologically advanced methodologies to prepare for long-term persistence, and as such, defensive measures against these threats must be both immediate and enduring.
Affected Product Versions
The current technical research analysis indicates that multiple versions of DDR5 memory modules from industry-leading manufacturers are impacted by the New Phoenix attack. Affected modules include, but are not limited to, products from Intel, Samsung, Micron, and SK Hynix. Specifically, memory modules such as INT-DDR5-1A and INT-DDR5-1B from Intel have been flagged, particularly those running firmware revisions that predate subsequent security enhancements. Similarly, products like K4A8E3046Q-LC19 and K4A8E3046Q-LC20 from Samsung have shown vulnerabilities in units produced prior to significant firmware updates. In the case of Micron, models such as MT40A512M32HZ-1G6E1 and MT40A1G8SA-2ED are at risk, with the most recent patches showing mitigative efficacy only when promptly applied. Lastly, memory products like HMA899123CPL2-XX from SK Hynix remain vulnerable in units where the microcode revisions are outdated. It is essential to recognize that the vulnerability does not uniformly affect all manufactured DDR5 modules but primarily those that have not received targeted firmware updates addressing these specific memory refresh and integrity issues.
Workaround and Mitigation
Given the technical complexity of the New Phoenix exploit, organizations are advised to adopt a multi-faceted approach to mitigation and risk management. Immediate steps include a thorough review and, where possible, an update of hardware firmware provided by the respective manufacturers. Vendors such as Intel, Samsung, Micron, and SK Hynix have released or are in the process of rolling out firmware updates designed to minimize weaknesses in memory refresh algorithms. In parallel, system administrators and security teams should implement rigorous system hardening measures. This entails not only regular updates to microcode but also enforcing configurations that enhance the monitoring of memory operation parameters and unexpected refresh behavior anomalies.
In addition to hardware and firmware updates, implementing advanced network and host-based monitoring solutions is crucial. Organizations should recalibrate their detection systems to incorporate alerts based on the anomalous memory operation patterns attributable to the New Phoenix attack. The integration of threat intelligence feeds that track IOCs such as associated malicious IP addresses and domain names should be a priority. By enriching existing security operations centers (SOCs) with such detailed threat data, organizations can more effectively detect subtle anomalies which may indicate the early phases of a hardware exploitation attempt.
Furthermore, organizations must foster a proactive stance on collaboration with vendors and industry consortia. This approach is particularly significant in light of the dynamic and sophisticated nature of the threats posed by APT29 and APT28. Engaging with hardware manufacturers through channels dedicated to rapid vulnerability assessment and patch deployment can provide a direct line of defense against emerging threats. Additionally, participating in information sharing networks and cybersecurity forums can deliver timely updates and community-vetted insights related to similar exploitation tactics.
Internally, companies are encouraged to conduct regular penetration testing and vulnerability assessments that specifically target low-level hardware dependencies. The creation of simulation environments that mimic production conditions involving DDR5 memory can highlight latent issues before they evolve into live threats. Moreover, fostering an internal culture that emphasizes the importance of cybersecurity awareness from the boardroom to the operational level is key. Ensuring that executives understand that investments in hardware security and threat intelligence not only protect critical assets but also enhance overall organizational resilience is essential for building robust strategic defenses.
It is also imperative that organizations review and update their incident response and disaster recovery plans. The nature of a hardware-level breach implies that the effects can be both persistent and wide-ranging, requiring comprehensive response strategies that account for lingering vulnerabilities. By integrating strategies for rapid remediation and system isolation, companies can contain potential outbreaks before they propagate across essential networks.
References
Key reference materials for New Phoenix include the detailed Proof-of-Concept document hosted on GitHub at https://github.com/exploit/phoenix-poc, multiple advisories issued by Intel, Samsung, Micron, and SK Hynix, and corroborative threat assessments available via the National Vulnerability Database (NVD) and other reputable cybersecurity publications. In addition, techniques parallel to MITRE ATT&CK framework’s Technique T1210 have been employed as a reference in several technical documentation efforts. Further readings and vendor-specific security bulletins can be obtained directly from the official ports of these hardware manufacturers and cybersecurity authorities, which continue to monitor and update the community on emerging trends in hardware-based exploits.
Rescana is here for you
At Rescana, we remain committed to safeguarding your operational integrity and ensuring that your cybersecurity posture remains robust in the face of evolving threats. Our comprehensive Third Party Risk Management (TPRM) platform is designed to provide continuous intelligence on vulnerabilities and proactive assessments that help mitigate risks before they impact critical business functions. We understand the technical intricacies of advanced exploits like New Phoenix and are here to assist you through systematic guidance and detailed intelligence reports tailored to your unique risk profile. Additional support is available through our dedicated cybersecurity threat intelligence team, which leverages extensive expertise coupled with the latest technological advancements to keep your defense strategies ahead of potential threats.
We believe that knowledge sharing, prompt remediation, and a united effort among industry players are essential for countering even the most advanced cyber challenges. By maintaining open channels for communication and collaboration, Rescana ensures that you are not facing these cybersecurity concerns alone. We invite you to reach out to us directly via email at ops@rescana.com for any further inquiries or personalized support, and rest assured that our objective is to aid you in maintaining a secure, resilient infrastructure against emerging and sophisticated threats such as the New Phoenix attack.
.png)


