Title: Apple’s Safari Browser Still Vulnerable to Spectre Attacks, Reveals Recent Study
In a recent study conducted by researchers from Ruhr University Bochum, Georgia Tech, and the University of Michigan, it has been discovered that Apple’s Safari browser is still susceptible to Spectre attacks. Despite efforts to address this hardware vulnerability since its emergence in 2018, both Mac and iOS systems remain at risk, especially when utilizing Safari.
The Spectre attack exploits a fundamental feature of modern microprocessors called speculative execution. This technique allows CPUs to optimize performance by executing instructions out of order, predicting which instructions will be needed next. However, Spectre attacks uncovered a vulnerability in the hardware architecture of processors, potentially compromising sensitive data. Although manufacturers implemented countermeasures, the study suggests that these measures may not provide sufficient protection.
The research project is led by Professor Yuval Yarom from Ruhr University Bochum’s Cluster of Excellence “Cyber Security in the Age of Large-Scale Adversaries” (CASA), along with Associate Professor Daniel Genkin from Georgia Tech and Stephan van Schaik from the University of Michigan. They are set to present their findings at the Conference on Computer and Communications Security in Copenhagen from November 26 to 30.
To execute the identified “iLeakage” attack, attackers must direct users to a website under their control. Therefore, Yarom advises users to exercise caution and only interact with trustworthy sites. Once a user visits the attacker’s website, the attacker can open the user’s email app in a separate window and view the contents of their inbox. Additionally, they can navigate to other websites, such as the login page of the user’s bank.
Furthermore, the research team noted that if the auto-fill option is enabled, attackers could automatically access login data stored in the LastPass password manager, potentially compromising supposedly secure passwords.
The vulnerability of the Apple Safari browser stems from the operational principle of modern CPUs, which execute instructions concurrently. This speculative execution method accelerates processing but may initiate instructions even when conditions for their execution are uncertain. These discarded processes leave traces, creating an exploitable vulnerability for attackers to extract sensitive memory data. Protective measures have been integrated into web browsers by manufacturers, such as running each Safari web page accessed by the user in a separate process. However, the researchers found a loophole that allows them to bypass this defense by opening a second web page in the same process, enabling attackers to intercept information that should have been unattainable.
It is crucial for Apple Safari users to be aware of this vulnerability and take appropriate precautions when browsing the internet. As the study highlights, caution is advised when visiting websites and interacting with online services. Manufacturers and developers will need to continue their efforts to address vulnerabilities and ensure the security of their browser systems.

I have over 10 years of experience in the cryptocurrency industry and I have been on the list of the top authors on LinkedIn for the past 5 years. I have a wealth of knowledge to share with my readers, and my goal is to help them navigate the ever-changing world of cryptocurrencies.