T 5.150 Compromising the hypervisor of virtual IT systems

The hypervisor is the central component of a virtualisation server and it controls all virtual machines executed on this virtualisation server. It assigns processor and main memory resources and distributes the available computation time to the virtual machines. Furthermore, it manages the access of the virtual IT systems to the network and the storage resources. A successful attack to this component means the loss of control of all virtual IT systems executed in the context of this hypervisor. An attack on a hypervisor may predominantly be performed as follows:

Example:

A computer centre service provider operates IT systems for several customers competing with each other. In order to reduce the system operation costs for the customers and to stay competitive, the service provider introduces a virtualisation solution in its computer centre operations. The service provider informs its customers about the fact that their systems are now operated as virtual IT systems. Since the network of the computer centre service provider is designed in such a way that no communication connections can be established between the IT systems of different customers using the network, the service provider continues to guarantee that the confidentiality of the customers' data is ensured. The service provider checks this with the help of regular audits and also provides its customers with audit possibilities.

A database administrator of one of the customers is provided with the option of interactively logging in to the IT systems operated by the computer centre service provider. He has administrator rights on the database system. Hoping to gain information about a competitor of his/her employer, he now starts malware allowing him to execute his own code in the context of the hypervisor due to an error in the graphics card emulation of the hypervisor. This code allows for monitoring all hypervisor functions. In this way, he is able to identify a database system of another customer of the computer centre service provider as a database system of a direct competitor. Using the bulk memory interface of the hypervisor, he manages to read data from and modify content in the database of this virtual machine. This significantly disrupts the production of the competitor and the company of the administrator is provided with a competitive advantage.