Hyperjacking

Hyperjacking is an attack where a user takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host.[1] The point of the attack is to target the operating system that's below the VM's so that the attackers program can run and the applications on the VMs above it will be completely oblivious to its presence.

Overview

Hyperjacking

Hyperjacking involves installing a malicious, fake hypervisor that can manage the entire server system. Regular security measures are ineffective because the operating system will not be aware that the machine has been compromised. In hyperjacking, the hypervisor specifically operates in stealth mode and runs beneath the machine, it makes more difficult to detect and more likely gain access to computer servers where it can affect the operation of the entire institution or company. If the hacker gains access to the hypervisor, everything that is connected to that server can be manipulated.[2] The hypervisor represents a single point of failure when it comes to the security and protection of sensitive information.[3]

For a hyperjacking attack to succeed, an attacker would have to take control of the hypervisor by the following methods:[4]

Mitigation techniques

Some basic design features in a virtual environment can help mitigate the risks of hyperjacking:

Hypervisor training can be found at How to Use a Hypervisor in Cloud Computing Virtualization, which illustrates the basics of hypervisor administration.

Known attacks

There has not been any report of an actual demonstration of a successful hyperjacking besides "proof of concept" testing. Hyperjackings are rare due to the difficulty of directly accessing hypervisors; however, hyperjacking is considered a real-world threat.[5]

References

  1. 1 2 3 4 "HYPERJACKING". Telelink. Retrieved 27 February 2015.
  2. Gray, Daniel. "Hyperjacking - Future Computer Server Threat". SysChat. Retrieved 27 February 2015.
  3. Ryan, Sherstobitoff. "Virtualization Security - Part 2". Virtualization Journal. Retrieved 27 February 2015.
  4. Sugano, Alan. "Security and Server Virtualization". WindowsITPro. Retrieved 27 February 2015.
  5. "Common Virtualization Vulnerabilities and How to Mitigate Risks". Penetration Testing Lab. Retrieved 27 February 2015.
This article is issued from Wikipedia - version of the Wednesday, May 20, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.