Yet another chip flaw allows attackers to steal any data that's recently been accessed by the processor. Almost every Intel chip manufactured since 2011 is vulnerable. The good news is that attackers must be able to run code on the machine, which requires the machine to have already been compromised in some other manner.
Microsoft, Apple, and Google have already issued updates to stop the vulnerability, which takes advantage of Microarchitectural Data Sampling. AWS has also patched their hypervisors and published this Security Release.
Red Hat's YouTube channel has an excellent video detailing the MDS exploit.
Microarchitectural Data Sampling-also known as MDS, ZombieLoad, RIDL & Fallout-is a set of Intel processor-based vulnerabilities that allows unauthorized users to access data used by other programs, containers, and virtual machines. MDS lets attackers read--or sample--data from previous operations and potentially steal sensitive information by using other methods to stitch several pieces together.
Codedamn has a short video demonstrating the attack in action.
This video shows you how to demonstrate a zombieload attack using a macOS + VM running Ubuntu 18.04 where a VM steals information from host OS using Zombieload attack. Zombieload attack is the 3rd major processor attack after meltdown and spectre last year.