igor - Fotolia
How can enterprises stop the Flip Feng Shui exploit from hijacking VMs?
The Flip Feng Shui attack can target virtual machines. Expert Judith Myerson explains the exploit and describes how to prevent it from hijacking enterprise VMs.
My company has been moving enterprise systems to virtual machines. Can you tell me how we can prevent the Flip Feng Shui attack from hijacking our virtual machines?
Flip Feng Shui is a bit flipping exploit. An attacker uses it to hijack a virtual machine.
Hijacking is made possible by flipping a bit in cryptographic software residing in the targeted virtual machine. This makes it easier for the attacker to weaken and bypass the software.
Attacking a virtual machine with Flip Feng Shui is a two-step process. As the researchers at the Vrije Universiteit Amsterdam have found, the first step is to abuse Linux's memory deduplication in one virtual machine in order to gain control of another virtual machine. Memory deduplication is an OS feature widely used in cloud production that allows anyone to reverse a physical page into a virtual page.
The second step in a Flip Feng Shui attack is to exploit the Rowhammer bug to flip a single bit on the target page that contains any software from the victim virtual machine. This includes OpenSSH public keys, Debian and Ubuntu update URLs, and trusted public keys.
Once it is weakened or rendered useless, the victim virtual machine opens its door wide to the hijackers.
To defend a virtual machine against the Flip Feng Shui attack, you must disable memory deduplication, and then quickly move on to extensive Rowhammer testing of the dynamic RAM chip to make sure the bit doesn't flip.
You should also consider a newer protection known as directed row refresh that has been implemented in certain types of DDR4 RAM chips. DDR4 is short for double data rate fourth-generation, and it offers a wider range of clock speeds, lower power consumption and reduced latency than its predecessors.
As an additional layer of defense, you should consider checking sensitive information for integrity to make sure the information does not contain a flip bit.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Learn how to mitigate the bit flipping flaw caused by Rowhammer exploits
Find out how the Flip Feng Shui technique undermines cloud security
Discover whether Microsoft Edge users are at risk of a Rowhammer exploit
Dig Deeper on Application and platform security
Related Q&A from Judith Myerson
Site-to-site VPN security benefits and potential risks
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not ... Continue Reading
Should I worry about the Constrained Application Protocol?
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
How can I protect my self-encrypting drives?
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading