The #1 Resource On The Web For Cyber Security Information, Education, & Jobs

A new cloud attack can take full control of virtual machines with virtually no effort put in

ISS_5188_00768 (300 x 250)

The world of IT has just witnessed the most unsettling attack resulting from the rowhammer exploit. The exploit can flip individual bits in the memory of a computer.

The technique is so precise that it can allow a single machine to start stealing data from other machines that are hosted on the same cloud.

Until now, the Rowhammer exploit was considered a clumsy attack tool because it wasn’t really good enough to control where the data corrupting bits happened on a machine. Up till now, this attack was only considered a glitch until recently.

It is now capable of manipulating deduplication operations that are very common amongst cloud hosts to save memory.

Read more details http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/

Jake Ciber

Jack of all trades... master of none... ABL... Always Be Learning! I love what I do and I love helping people.

Leave a Comment





This site uses Akismet to reduce spam. Learn how your comment data is processed.