The Rowhammer effect
Rowhammer is a security exploit that relies on the leaking of electrical charges between adjacent memory cells, enabling a threat actor to flip 1s and 0s and change the content in the memory.
This powerful attack can bypass all software-based security mechanisms, leading to privilege escalation, memory corruption, and more.
It was first discovered in 2014, and within a year, two working privilege escalation exploits based on the researcher were
already available.
Gradually, this became a widespread problem, and even Android tools were developed, exploiting the Rowhammer vulnerability on smartphones to gain root access.
The mitigations applied to address this bit-flipping problem showed the first signs of their insufficiency in March 2020, when academic researchers proved that a bypass was possible.
Manufacturers had implemented a set of mitigations called "Target Row Refresh" (TRR), which were mainly effective in keeping the then-new DDR4 safe from attacks.
The attack used against it was called '
TRRespass,' and was another fuzzing-based technique that successfully found usable Rowhammering patterns.