New DDR5 Rowhammer Attack: The Phoenix Rises to Flip Bits and Escalate Privileges!
DDR5 memory chips might feel invincible, but the new Phoenix Rowhammer attack can flip bits faster than a pancake chef on a Sunday brunch shift. Researchers cracked the code on SK Hynix’s defenses, proving that even the toughest nuts can be hammered open. Watch out, your RAM might be plotting a privilege coup!

Hot Take:
DDR5 chips thought they were safe, but Phoenix swooped in to flip the script—literally. It turns out that even the latest in memory chip tech couldn’t escape the wrath of researchers with a penchant for bit-flipping chaos. Who knew that a few thousand refresh intervals could become a hacker’s playground? Now, we all have to triple our refresh rates just to keep our bits in line. It’s like needing to drink three cups of coffee just to stay awake in a boring meeting. But hey, at least we’re getting new excuses for our system crashes—”Hey boss, it’s not me, it’s those pesky Rowhammers again!”
Key Points:
- Researchers from ETH Zurich and Google devised the Phoenix attack to bypass DDR5 memory protections.
- Phoenix targets SK Hynix DDR5 chips but may affect others too.
- The attack evades TRR by exploiting unmonitored refresh intervals.
- Researchers achieved root access in under two minutes on test systems.
- Phoenix is tracked as CVE-2025-6202, affecting DIMMs from 2021 to 2024.