New hacking technique imperceptibly changes memory virtual servers
For the first time ever a team of Dutch hacking experts, led by cyber security professor Herbert Bos, managed to alter the memory of virtual machines in the cloud without a software bug, using a new attack technique.
With this technique an attacker can crack the keys of secured virtual machines or install malware without it being noticed. It’s a new deduplication-based attack in which data can not only be viewed and leaked, but also modified using a hardware glitch. By doing so the attacker can order the server to install malicious and unwanted software or allow logins by unauthorized persons.
Deduplicationand Rowhammer bug
With the new attack technique Flip Feng Shui (FSS), an attacker rents a virtual machine on the same host as the victim. This can be done by renting many virtual machines until one of them lands next to the victim. A virtual machine in the cloud is often used to run applications, test new software, or run a website. There are public (for everyone), community (for a select group) and private (for one organization accessible) clouds. The attacker writes a memory page that he knows exists in the victim on the vulnerable memory location and lets it deduplicate. As a result, the identical pages will be merged into one in order to save space (the information is, after all, the same). That page is stored in the same part of the memory of the physical computer. The attacker can now modify the information in the general memory of the computer. This can be done by triggering a hardware bug dubbed Rowhammer, which causes flip bits from 0 to 1 or vice versa, to seek out the vulnerable memory cells and change them.
The researchers of the Vrije Universiteit Amsterdam, who worked together with a researcher from the Catholic University of Leuven, describe in their research two attacks on the operating systems Debian and Ubuntu. The first FFS attack gained access to the virtual machines through weakening OpenSSH public keys. The attacker did this by changing the victim’s public key with one bit. In the second attack, the settings of the software management application apt were adjusted by making minor changes to the URL from where apt downloads software. The server could then install malware that presents itself as a software update. The integrity check could be circumvented by making a small change to the public key that verifies the integrity of the apt-get software packages.
Debian, Ubuntu, OpenSSH and other companies included in the research were notified before the publication and all have responded. The National Cyber Security Centre (NSCS) of the Dutch government has issued a fact sheet containing information and advice on FFS.
The Latest on: Hacking
via Google News
The Latest on: Hacking
- The thriving business of ‘Ikea hacking’on June 19, 2021 at 2:31 pm
And for companies that sell custom Ikea-friendly fixtures — legs, couch covers, knobs, and cabinet doors — business is booming. In a way, Ikea is kind of like the Bitcoin of furniture: the company ...
- Boy in courtroom images was charged with manslaughter, not hacking bankon June 19, 2021 at 11:00 am
CLAIM: Photos show a boy who, at 11 years old, hacked the computer system of a Swiss bank and transferred $75 billion to his father’s account.
- My Turn: The ‘hacking’ of American values and truthson June 19, 2021 at 5:00 am
Our New Hampshire state house apparently lurches to the marching orders of a national far-right disinformation agenda. HB 544 “defines and prohibits the dissemination of certain divisive concepts ...
- Putting an end to years long sexual abuse ethical hackingon June 18, 2021 at 6:29 pm
Someone hacked my snapchat and is now releasing private images of my girlfriend and i on Instagram. He is sending these images and videos to everyone in our friend circle. He is able to get through ...
- Mexico conservatives to sue over gay pride Twitter hackingon June 18, 2021 at 7:41 am
A socially conservative Mexican political party is threatening legal action Friday after someone hacked the Solidarity Encounter Party's Twitter account and posted the gay pride banner and the slogan ...
- The Stolen Data of Audi and Volkswagen Is Being Sold on a Hacking Forumon June 18, 2021 at 2:52 am
Volkswagen Group of America, Inc. (VWGoA) declared that more than 3.3 million customers and interested buyers had their information exposed in a tremendous data breach, that occurred after a vendor ...
- McBroom: No indication of election hackingon June 17, 2021 at 10:06 pm
The claims of election hacking pushed by Mike Lindell and others appear to be “made up” and “conjecture,” State Sen. Ed McBroom told the Houghton County Board during its Tuesday meeting. Last month, ...
- Noel Fielding and Cheryl Tweedy bring phone-hacking claims against Mirror owneron May 31, 2021 at 2:27 am
Fifteen years after the phone-hacking scandal began, more than 20 individuals have recently filed legal proceedings against the owner of the Mirror, with more cases waiting in the wings.
- Learn the basics of ethical hacking with this course bundleon May 31, 2021 at 2:27 am
TL;DR: Get an intro to ethical hacking with the All-In-One 2021 Super-Sized Ethical Hacking Bundle. As of May 31, get this 18-course bundle for only $20 — a 99% discount. If you’re considering ...
- Become a cybersecurity hero with this ethical hacking bundleon May 21, 2021 at 9:52 pm
TL;DR: The 2021 Premium Ethical Hacking Certification Bundle is on sale for £42.44 as of May 22, saving you 96% on list price. When the fictional Behavioral Analysis Unit of the FBI needed ...
via Bing News