‘Maybe Bigger than Heartbleed’: Venom VM Bug is ‘Perfect’ for Stealing Bitcoins and Passwords

Updated on Dec 16, 2017 at 12:44 pm UTC by · 3 min read

CrowdStrike researchers found a previously unknown Venom bug, which provides hackers with an access to every machine within the data center network.

Researchers have discovered an unknown bug, dubbed Venom, which allows hackers to operate malicious software in data centers. Although researchers have not yet found the malware exploiting the flaw, it is known that the bug can affect a broad range of virtualization software on main operating systems.

The bug was found by Jason Geffner, a senior security researcher at CrowdStrike, while carrying out an audit of virtual machine hypervisors. The bug has existed for 11 years already, when the virtual FDC code was included to QEMU, but remained unknown until now.

“This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host’s local network and adjacent systems,” CrowdStrike stated on its website.

Nowadays, the majority of datacenters unite customers into multiple operating systems or virtualized machines on one server. These systems, which are created to share resources, remain separately in the host hypervisor. By exploiting the vulnerability, attackers can get an access to the whole hypervisor and every device in the datacenter.

How a Venom attack could have gone down, according to CrowdStrike. Photo: CrowdStrike

The bug lies in the virtual floppy disk controller in QEMU, an open-source computer emulator that is widely applied in cloud computing. This component is a part of many virtualization platforms, such as KVM and Xen, and according to experts, the biggest target base for cybercriminals would be hosting providers who run these platforms.

To exploit the vulnerability, attackers can purchase a cloud hosting provider, from where they can gain an access to the local network, which runs the host, and obtain data stored there.

“Exploitation of the VENOM vulnerability can expose access to corporate intellectual property (IP), in addition to sensitive and personally identifiable information (PII), potentially impacting the thousands of organizations and millions of end users that rely on affected VMs for the allocation of shared computing resources, as well as connectivity, storage, security, and privacy,” CrowdStrike wrote.

The vulnerability is rather dangerous, taking into account the growing number of companies that move their resources to cloud providers. Venom poses threat to companies as it can put its sensitive data at risk.

Amazon, one of the major cloud services providers, informed that its systems are not vulnerable to the bug.  Microsoft and Google were not affected by the bug too.

Share:

Related Articles

FBI Uncovers Akira Ransomware Group behind Over 250 Business Breaches

By April 19th, 2024

The group began its activities in March 2023, and has since infiltrated over 250 business entities, making away as much as $42 million in ransomware proceeds.

North Korean Hackers Attack American IT Company JumpCloud

By July 21st, 2023

CrowdStrike confirms that the hack was carried out by the “Labyrinth Chollima” group.

CNBC’s Jim Cramer Reveals Mad Money 5G ETF, His 10 Favourite 5G Names

By January 18th, 2021

Cramer’s top 10 5G names include a wireless carrier, cell tower company, two hardware developers, four semiconductor firms, a cybersecurity provider, and a cloud content company.

Exit mobile version