Maxim Hot and Mark Yermolov - reported on the possibility of free access to data in Intel processors. The access do not need any special equipment, like before.
Since Skylake processors read information from the processor registers , and get over it total control, you can use only one cable for USB 3.0 port. In some cases, you may need a programmer, for example, to re-write your BIOS, but in general, implemented by the regular mechanism of debugging processor is vulnerable without the use of special programs and devices.
It is reported that Intel is taking steps to protect against this vulnerability. At the moment, allegedly under this scheme are vulnerable only processors Skylake U. This line of processors for notebooks and compact desktop NUC type systems, as well as candy bars. Vulnerability is not defined programs to protect against such attacks, because access to it is below the programmed level. Thus in contrast to the same Stuxnet, which only works on Windows, breaking with debugging does not require any operating system.
Access to the processor and its data via the JTAG (Joint Test Action Group) debug interface. JTAG interface provides access to hardware debugging kernel, hypervisor and drivers. For hacking quite regular Intel package for developers of software Intel System Studio and its constituent Intel System Debugger and Intel components DAL. If access to the processor via a new technology Direct Connect Interface (DCI) is not blocked by default, an attacker could gain complete control over a victim's computer. DCI access technologies through a port USB 3.0, as mentioned above, Intel company first implemented in Skylake processors.