Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying

Discussion in 'other security issues & news' started by hawki, Sep 29, 2022.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
    "For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice...with potentially no way for a targeted computer to detect the intrusion...

    Today, Google-owned security firm Mandiant and virtualization firm VMware jointly published warnings that a sophisticated hacker group has been installing backdoors in VMware’s virtualization software on multiple targets’ networks as part of an apparent espionage campaign. By planting their own code in victims’ so-called hypervisors—VMware software that runs on a physical computer to manage all the virtual machines it hosts—the hackers were able to invisibly watch and run commands on the computers those hypervisors oversee..."

    https://www.wired.com/story/hyperjacking-vmware-mandiant/
     
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,544
    Location:
    U.S.A. (South)
    Whoa. Innovation in reverse Yikes!! So much for virtual safety from arbitrary penetration control. :eek:
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes, but shouldn't this be easily solvable by simply monitoring or protecting the hypervisor from any modification? Similar to how M$ decided to protect the Windows OS kernel with PatchGuard back in 2006.
     
  4. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    9,187
    Location:
    USA
    You'd think. Seems reasonable. They probably never considered that anyone would be able to do what is being done.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Well they should have considered this, since back in 2006 this was already talked about. I did see that M$ has added HVCI to Windows 11, it protects the kernel from malicious drivers. Cool, but who is monitoring the hypervisor itself? I remember that back in the days you had Hypersight Rootkit Detector which was the first anti-rootkit tool that run with higher privileges than rootkits themselves, pretty cool stuff, see second link.

    https://www.microsoft.com/security/...curity-features-are-designed-for-hybrid-work/
    https://www.softpedia.com/get/Security/Security-Related/Hypersight-Rootkit-Detector.shtml
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.