New hacking technique imperceptibly changes memory virtual servers
For the first time ever a team of Dutch hacking experts, led by cyber security professor Herbert Bos, managed to alter the memory of virtual machines in the cloud without a software bug, using a new attack technique.
With this technique an attacker can crack the keys of secured virtual machines or install malware without it being noticed. It’s a new deduplication-based attack in which data can not only be viewed and leaked, but also modified using a hardware glitch. By doing so the attacker can order the server to install malicious and unwanted software or allow logins by unauthorized persons.
Deduplicationand Rowhammer bug
With the new attack technique Flip Feng Shui (FSS), an attacker rents a virtual machine on the same host as the victim. This can be done by renting many virtual machines until one of them lands next to the victim. A virtual machine in the cloud is often used to run applications, test new software, or run a website. There are public (for everyone), community (for a select group) and private (for one organization accessible) clouds. The attacker writes a memory page that he knows exists in the victim on the vulnerable memory location and lets it deduplicate. As a result, the identical pages will be merged into one in order to save space (the information is, after all, the same). That page is stored in the same part of the memory of the physical computer. The attacker can now modify the information in the general memory of the computer. This can be done by triggering a hardware bug dubbed Rowhammer, which causes flip bits from 0 to 1 or vice versa, to seek out the vulnerable memory cells and change them.
The researchers of the Vrije Universiteit Amsterdam, who worked together with a researcher from the Catholic University of Leuven, describe in their research two attacks on the operating systems Debian and Ubuntu. The first FFS attack gained access to the virtual machines through weakening OpenSSH public keys. The attacker did this by changing the victim’s public key with one bit. In the second attack, the settings of the software management application apt were adjusted by making minor changes to the URL from where apt downloads software. The server could then install malware that presents itself as a software update. The integrity check could be circumvented by making a small change to the public key that verifies the integrity of the apt-get software packages.
Debian, Ubuntu, OpenSSH and other companies included in the research were notified before the publication and all have responded. The National Cyber Security Centre (NSCS) of the Dutch government has issued a fact sheet containing information and advice on FFS.
The Latest on: Hacking
via Google News
The Latest on: Hacking
- GeekWire Calendar Picks: TEDxSeattle, hacking for good, science improv, and automated testingon November 15, 2019 at 2:06 pm
— Since its founding in 1984, TED has become the most prolific provider of expert talks on a wide range of topics. TEDxSeattle, now in its 10th year, has given local artists, activists, and scientists ...
- 2 men arrested in elaborate plot to steal $550K in cryptocurrency by hacking social media accountson November 15, 2019 at 11:25 am
2 men arrested in elaborate plot to steal $550K in cryptocurrency by hacking social media accounts Two Massachusetts men hacked into social media accounts and threatened family members in order to ...
- The trouble with hacking group Shadowcrewon November 15, 2019 at 11:06 am
During the early years of the internet, the United States Secret Service conducted a groundbreaking mission to take down one of the first criminal hacker groups -- Shadowcrew. For more, watch ...
- Roger Stone: Trump adviser found guilty on all counts in WikiLeaks hacking caseon November 15, 2019 at 10:31 am
Roger Stone, a self-described “dirty trickster” and longtime adviser to Donald Trump, was found guilty on Friday of obstructing a congressional investigation into Russian interference in the 2016 ...
- A hacking scandal and climate scienceon November 15, 2019 at 10:01 am
How people communicate, challenge and influence each other online. What happened after a data hack suggested that climate change caused by humans is a hoax? The haunting series of photos by US ...
- How to stop public USB ports from hacking your phoneon November 15, 2019 at 7:00 am
The L.A. County District Attorney’s office put out a scary warning this week: That USB charger provided at airports, hotels, or other public locations could be loaded with malware that will hack your ...
- iOS App Tries to Warn You of iPhone Hacking Attemptson November 14, 2019 at 2:13 pm
A new iOS app launching today promises to detect whether your iPhone has been secretly hacked. The iVerify app comes from security firm Trail of Bits, and it's been designed to periodically scan your ...
- Iranian hacking group built its own VPN networkon November 13, 2019 at 11:00 pm
One of Iran's elite state-sponsored hacking groups has built and has been operating its own private network of VPN nodes, which they've using to connect to hacking infrastructure, perform ...
- TV tonight: the climate crisis hacking scandalon November 13, 2019 at 10:00 pm
When science meets vested interests, the results can be ugly, never more so than during the 2009 scandal surrounding the hacking of academic emails that were interpreted as casting doubt on the ...
- Russian Faces Hacking Charges After Israel Ships Him to U.S.on November 12, 2019 at 2:11 pm
Photographer: Andrei Shirokov/TASS via Getty Images Photographer: Andrei Shirokov/TASS via Getty Images An accused Russian hacker who has been at the center of a diplomatic feud between Israel and ...
via Bing News