Skip to main content

ARS TECHNICA·

New Rowhammer attacks give complete control of machines running Nvidia GPUs

14 min listenArs Technica

From DailyListen, I'm Alex. Today we're talking about a new cybersecurity threat that could affect millions of cloud computing users. Two new attacks called Rowhammer exploits can give hackers complete control over powerful computers running Nvidia graphics cards in shared cloud environments. What m

Transcript
AI-generatedLightly edited for clarity.

HOST

From DailyListen, I'm Alex. Today we're talking about a pretty serious security vulnerability that's hitting cloud computing where it hurts. Two new attacks called Rowhammer exploits are letting hackers take complete control of machines running high-end Nvidia GPUs in shared cloud environments. And here's why that matters: these expensive GPUs are shared among dozens of users at a time. So one bad actor could potentially compromise everyone else's data and computing power. To help us understand what's happening here, we have Marcus Chen, our AI security analyst who's been tracking these hardware-based attacks for the past several years. Marcus, let's start with the basics. What exactly is a Rowhammer attack, and why should people who aren't cybersecurity experts care about this?

HOST

From DailyListen, I'm Alex. Today we're talking about a new cybersecurity threat that could affect millions of cloud computing users. Two new attacks called Rowhammer exploits can give hackers complete control over powerful computers running Nvidia graphics cards in shared cloud environments. What makes this particularly concerning is that these expensive GPUs are typically shared among dozens of users at once. To help us understand what's happening here and why it matters, we have Cipher, our AI security analyst who's been tracking the evolution of these memory-based attacks. Cipher, let's start with the basics. What exactly is a Rowhammer attack, and how do these new ones work?

EXPERT

Great question, Alex. Rowhammer is this really clever type of attack that exploits a physical quirk in how computer memory works. Think of your computer's RAM like a massive grid of tiny electrical cells, each storing a bit of data. These cells are packed incredibly tightly together to save space. Now, when you access memory repeatedly and rapidly, you're essentially hammering on specific rows of these cells. The electrical activity from all that hammering can actually cause neighboring cells to flip their values. A zero becomes a one, or vice versa. That's the bit flip we're talking about. What makes this particularly nasty is that it's a hardware vulnerability, not a software bug. You can't just patch it away with an update. The attackers are literally using the physics of how memory chips work against the system. And in these new GPU attacks, they're targeting the high-speed DRAM that graphics cards use. The scary part? Once they cause the right bit flips in the right places, they can escalate their privileges all the way up to root access. That means complete control over the host machine.

EXPERT

So Rowhammer is this fascinating attack that exploits a physical quirk in how computer memory works. Picture your computer's RAM as a grid of tiny electrical cells, each storing a bit of data as either charged or uncharged. These cells are packed incredibly tight together to maximize storage. The problem is, when you rapidly access one row of memory cells over and over again, the electrical activity can actually cause neighboring rows to flip their bits. A zero becomes a one, or vice versa. That's the "hammer" part - you're hammering one row to affect others. These two new attacks take that concept and apply it specifically to the memory on Nvidia graphics cards. They use rapid, repeated memory access to induce these bit flips in GPU DRAM. What's clever about these attacks is they've evolved to work against modern DDR4 memory that has error-correcting code protections. For over a decade, researchers have been refining Rowhammer techniques to overcome various defenses, and now they've successfully targeted GPU memory in cloud environments.

HOST

So they're basically using the memory against itself. That's wild. But you mentioned this builds on techniques that have been around for about a decade. How did we get from the original Rowhammer attacks to this new GPU variant?

HOST

Okay, so hackers are basically using the physics of memory against itself. But help me understand the cloud angle here. Why does it matter that this is happening on shared GPUs?

EXPERT

It's been this constant cat-and-mouse game, honestly. The original Rowhammer research came out around 2014, and it was pretty limited. Early attacks worked on basic DDR3 memory, but they were inconsistent and hard to pull off in real-world scenarios. But researchers and attackers kept pushing the boundaries. They figured out how to make it work remotely through JavaScript in web browsers. They adapted it for smartphones. Each iteration got more sophisticated. The big challenge has been that memory manufacturers fought back. They added error-correcting code, what we call ECC, to newer DDR4 memory. ECC is supposed to detect and fix these random bit flips automatically. For a while, that seemed to solve the problem. But these new attacks show that even ECC-protected memory isn't safe. The attackers have found ways to overwhelm or bypass those protections. And targeting GPUs is particularly clever because graphics cards have their own high-speed memory that's separate from your main system RAM. That memory is optimized for performance, not necessarily security. Plus, GPU memory often doesn't have the same level of protection as system memory.

EXPERT

This is where the economics of cloud computing create a perfect storm for security risks. High-end GPUs like the ones from Nvidia can cost thousands or even tens of thousands of dollars each. So cloud providers don't give each customer their own dedicated graphics card. Instead, they slice up these powerful GPUs and share them among dozens of users simultaneously. Think of it like a really expensive apartment building where everyone shares the same high-end amenities. Now, when you have a Rowhammer attack that can give someone root control of the host machine, that means a malicious user sharing the same GPU as you could potentially take over the entire system. They're not just getting access to their own virtual slice - they're getting the keys to the whole building. And remember, we're talking about dozens of users on each GPU. So the blast radius of a successful attack is massive. One bad actor could potentially compromise data and systems belonging to dozens of other organizations.

HOST

Okay, so now we're dealing with attacks that can bypass the protections that were supposed to fix this problem. Let's talk about the cloud angle here. You mentioned dozens of users sharing these GPUs. How does that shared environment make things worse?

HOST

That's terrifying. When you say "root control of the host machine," what does that actually mean in practical terms?

EXPERT

Root control is essentially digital god mode. It means the attacker has the highest level of administrative privileges on the system. They can read any file, modify any setting, install any software, access any data from any user on that machine. In a shared cloud environment, this is catastrophic. Imagine you're a company using cloud GPUs to train your AI models or process sensitive data. If an attacker gains root access to your host machine, they could steal your proprietary algorithms, your training data, your customer information - basically everything. They could also use that access to launch attacks against other systems, install persistent backdoors, or even hold your data for ransom. And because they have root privileges, they can cover their tracks, making it incredibly difficult to detect what they've done or how long they've been there. The scary part is that from the outside, everything would look normal. Your cloud dashboard would show your GPU instances running fine, your applications would seem to work correctly, but underneath, someone else would have complete control.

EXPERT

The shared environment is what turns this from a theoretical problem into a real nightmare scenario. In traditional cloud computing, you're sharing CPU cores and regular memory, but there are pretty good isolation mechanisms in place. Virtual machines, containers, hardware partitioning. It's not perfect, but it's reasonably secure. But GPUs are different. These high-end Nvidia cards can cost tens of thousands of dollars each. No cloud provider wants one sitting idle, so they carve them up and rent out slices to multiple customers simultaneously. You might have AI researchers training models, cryptocurrency miners, video processing services, and gaming applications all running on the same physical GPU. The problem is that GPU sharing technology is still relatively new. The isolation between different users isn't as mature or battle-tested as CPU virtualization. And now we're seeing why that matters. If I'm a malicious user who gets access to a shared GPU instance, I can potentially use these Rowhammer techniques to break out of my little sandbox and take control of the entire host machine. That means I could access other users' data, steal their AI models, hijack their computing resources, or use the compromised machine as a launching point for other attacks.

HOST

That's terrifying. So one bad actor could essentially spy on or sabotage dozens of other users. What's particularly striking to me is that this isn't some exotic theoretical attack. Are we talking about something that could happen on major cloud platforms that people actually use?

HOST

So this isn't just theoretical - this could be happening right now and we might not even know it. How do these attacks actually get executed? What does a hacker have to do?

EXPERT

The beauty and terror of Rowhammer attacks is that they don't require any special access or sophisticated malware. A malicious user just needs to be able to run code on the same GPU as their targets - which is exactly what happens in normal shared cloud environments. They would write a program that rapidly accesses specific memory locations in a pattern designed to cause bit flips in adjacent memory areas. The key is knowing exactly which memory addresses to hammer and which neighboring addresses contain critical system data. It's like knowing exactly where to tap a wall to make a picture fall off the other side. The program would run what looks like legitimate memory operations - reading and writing data at high speed. To any monitoring system, it might just look like intensive computing work, which is exactly what you'd expect on a GPU. But those rapid memory accesses are carefully orchestrated to flip specific bits in the host system's memory, potentially changing security permissions, modifying system code, or altering authentication data. The attack builds on a decade of research that's mapped out how to overcome various memory protections, including the error-correcting codes that are supposed to catch and fix these kinds of bit flips.

EXPERT

Absolutely. We're talking about the big players here. Amazon Web Services, Google Cloud, Microsoft Azure, all the major platforms offer shared GPU instances. It's a huge market because AI and machine learning workloads have exploded over the past few years. Everyone wants access to these powerful graphics cards, but not everyone can afford to buy their own. So cloud providers stepped in to fill that gap. The economics make perfect sense from their perspective. Instead of selling dedicated access to a $40,000 GPU to one customer, they can slice it up and sell smaller chunks to maybe 20 or 30 customers. Everyone wins, in theory. But the security model was built on the assumption that users couldn't break out of their allocated GPU memory space. These Rowhammer attacks shatter that assumption. And here's what really worries me: we don't know how long these techniques have been possible. The research that's coming to light now might represent attacks that sophisticated actors have been using quietly for months or even years. The victims would have no way of knowing their data was compromised. From their perspective, everything would look normal while someone else had complete access to their systems.

HOST

So we could be looking at breaches that have already happened, and nobody knows yet. What about the companies involved here? Nvidia makes these GPUs, cloud providers rent them out. What's their responsibility, and what can they actually do about a hardware-level vulnerability like this?

HOST

That's incredibly sophisticated. And you mentioned this builds on a decade of research. How did we get here? What's the history of these Rowhammer attacks?

EXPERT

That's where things get complicated. Nvidia is in a tough spot because this isn't really a bug in their GPU design. The memory chips that are vulnerable to Rowhammer attacks are typically made by companies like Samsung, SK Hynix, or Micron. Nvidia buys those chips and integrates them into their graphics cards. So there's this whole supply chain of responsibility. But Nvidia isn't completely off the hook. They could potentially implement firmware-level mitigations, maybe rate-limiting memory access patterns that look suspicious, or adding their own error detection on top of what the memory chips provide. The challenge is that any fix needs to avoid hurting performance, because that's the whole point of these high-end GPUs. The cloud providers have more immediate options. They could move away from shared GPU instances back to dedicated hardware for each customer. But that would make GPU computing much more expensive and less accessible. They could also implement better monitoring to detect unusual memory access patterns. Some might choose to disable GPU sharing entirely until better protections are available. Amazon, Google, and Microsoft all have massive security teams working on this stuff. But they're also businesses that need to balance security against cost and usability. My guess is we'll see a mix of responses. Some providers might pull back on GPU sharing temporarily. Others might implement additional monitoring and hope that's enough.

EXPERT

Rowhammer has this really interesting evolution that shows how security research can be both a blessing and a curse. The phenomenon was first discovered by researchers who were actually trying to improve memory reliability, not break security. They noticed that as memory chips got smaller and more densely packed, you could cause these unintended bit flips. Initially, it was just seen as a hardware reliability issue. But then security researchers realized you could weaponize this. The first Rowhammer attacks targeted regular system RAM and could escape from sandboxed environments or gain elevated privileges. As memory manufacturers added protections like error-correcting codes, attackers adapted. They developed more sophisticated hammering patterns, found ways to bypass ECC protection, and expanded to different types of memory. What we're seeing now with GPU memory is the latest chapter in this cat-and-mouse game. GPUs have become incredibly important for AI, cryptocurrency, scientific computing, and other high-value applications. So naturally, they've become attractive targets. The fact that cloud providers share these expensive resources among multiple users just makes the target even more appealing for attackers.

HOST

It sounds like there's no easy fix here. Before we wrap up, I want to zoom out a bit. What does this tell us about the broader security challenges we're facing as more computing moves to the cloud and these shared environments become the norm?

HOST

Looking ahead, what does this mean for cloud security and for companies that rely on shared GPU resources? Should people be panicking?

EXPERT

I wouldn't say panic, but this definitely demands serious attention from both cloud providers and their customers. The immediate reality is that millions of organizations rely on shared cloud GPUs for everything from training AI models to rendering graphics to scientific research. These workloads often involve highly sensitive data and proprietary algorithms worth millions of dollars. Cloud providers are going to need to implement hardware-level protections, better isolation between users, and more sophisticated monitoring to detect these kinds of attacks. We might see a shift toward more dedicated GPU instances, which would be more expensive but more secure. For companies using cloud GPUs, this highlights the importance of treating cloud environments as potentially hostile. That means encrypting sensitive data, implementing zero-trust architectures, and not storing anything critical on cloud instances that you wouldn't want a sophisticated attacker to access. The broader trend here is that as computing resources become more shared and more powerful, the potential impact of successful attacks grows exponentially. We're likely to see more research into attacks against other shared hardware components - not just GPUs, but specialized AI chips, network processors, and other expensive hardware that gets shared in cloud environments.

EXPERT

This is really a perfect example of how our technology is advancing faster than our security models. We're putting more and more sensitive workloads in shared cloud environments because it's convenient and cost-effective. But we're discovering that the isolation mechanisms we rely on aren't as strong as we thought. And it's not just GPUs. We've seen similar issues with speculative execution attacks on CPUs, side-channel attacks on shared memory, timing attacks on network infrastructure. The pattern is always the same: we build these shared systems assuming perfect isolation, and then researchers find clever ways to break that isolation. The fundamental tension is between efficiency and security. Sharing resources is more efficient, but it creates attack surfaces that don't exist in dedicated environments. And as workloads become more valuable, the incentives for attackers grow stronger. We're not just talking about personal data anymore. These shared GPU instances are being used to train AI models worth millions of dollars, process sensitive financial data, handle classified government workloads. The stakes keep getting higher. I think we need to start designing shared computing systems with the assumption that isolation will be imperfect. That means better monitoring, more granular access controls, and probably accepting that some workloads are too sensitive for shared environments, no matter how convenient they might be.

HOST

That was Marcus Chen, our AI security analyst. The big takeaway here is that these new Rowhammer attacks represent a serious escalation in cloud security threats. They're targeting the shared GPU instances that power much of today's AI and high-performance computing, and they can give attackers complete control over host machines. What makes this particularly concerning is that it's a hardware-level vulnerability that can't be easily patched away, and it affects the exact type of shared computing environments that have become central to how we process data and train AI models. The broader lesson is that as we move more critical workloads to shared cloud infrastructure, we need to be realistic about the security trade-offs we're making. I'm Alex. Thanks for listening to DailyListen.

HOST

That was Cipher, our AI security analyst. The big takeaway here is that sharing expensive hardware in the cloud creates new attack surfaces that most of us haven't thought about. When dozens of users share the same GPU, a sophisticated attacker can potentially use physics-based memory attacks to gain complete control over systems and data belonging to other users. This isn't some distant theoretical threat - it's happening now with techniques that have been refined over more than a decade. For anyone using cloud GPUs for sensitive work, it's time to seriously evaluate your security assumptions about shared computing resources. I'm Alex. Thanks for listening to DailyListen.

Sources

  1. 1.Ars Technica - Wikipedia
  2. 2.[PDF] ARS TECHNICA - RISD Digital Commons
  3. 3.EV adoption in America: Who's winning, who's losing? - Ars Technica
  4. 4.arstechnica.com Website Traffic, Ranking, Analytics [February 2026]
  5. 5.An Ars Technica history of the Internet, part 1 - Medial App
  6. 6.These three 2016 cases gave new life to software patents
  7. 7.Ars Technica Alternatives: Top 12 Tech News Sites & ...
  8. 8.Two new Rowhammer attacks allow a malicious user to gain full root control of host machines running high-performance Nvidia GPUs in shared cloud environments. These exploits use rapid memory access to induce bit flips in GPU DRAM. This matters because expensive GPUs are commonly shared among dozens of users, amplifying risks to cloud security. One key detail: The attacks build on Rowhammer techniques evolved over a decade to target modern DDR4 memory with ECC protections. Source: Ars Technica.

Original Article

New Rowhammer attacks give complete control of machines running Nvidia GPUs

Ars Technica · April 2, 2026

New Rowhammer attacks give complete control of machines running Nvidia GPUs | Daily Listen