My company has been moving enterprise systems to virtual machines. Can you tell me how we can prevent the Flip...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Feng Shui attack from hijacking our virtual machines?
Flip Feng Shui is a bit flipping exploit. An attacker uses it to hijack a virtual machine.
Hijacking is made possible by flipping a bit in cryptographic software residing in the targeted virtual machine. This makes it easier for the attacker to weaken and bypass the software.
Attacking a virtual machine with Flip Feng Shui is a two-step process. As the researchers at the Vrije Universiteit Amsterdam have found, the first step is to abuse Linux's memory deduplication in one virtual machine in order to gain control of another virtual machine. Memory deduplication is an OS feature widely used in cloud production that allows anyone to reverse a physical page into a virtual page.
The second step in a Flip Feng Shui attack is to exploit the Rowhammer bug to flip a single bit on the target page that contains any software from the victim virtual machine. This includes OpenSSH public keys, Debian and Ubuntu update URLs, and trusted public keys.
Once it is weakened or rendered useless, the victim virtual machine opens its door wide to the hijackers.
To defend a virtual machine against the Flip Feng Shui attack, you must disable memory deduplication, and then quickly move on to extensive Rowhammer testing of the dynamic RAM chip to make sure the bit doesn't flip.
You should also consider a newer protection known as directed row refresh that has been implemented in certain types of DDR4 RAM chips. DDR4 is short for double data rate fourth-generation, and it offers a wider range of clock speeds, lower power consumption and reduced latency than its predecessors.
As an additional layer of defense, you should consider checking sensitive information for integrity to make sure the information does not contain a flip bit.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Learn how to mitigate the bit flipping flaw caused by Rowhammer exploits
Find out how the Flip Feng Shui technique undermines cloud security
Discover whether Microsoft Edge users are at risk of a Rowhammer exploit
Dig Deeper on Virtualization security issues and threats
Related Q&A from Judith Myerson
Malware implants RedLeaves and PlugX infected networked systems in multiple industries and leveraged stolen administrator credentials. Expert Judith ...continue reading
A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to ...continue reading
A vulnerability in Intel AMT enables attackers to gain remote access to PCs and devices. Expert Judith Myerson explains how the attack works and what...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.