ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Are Servers on VMs are Safe from Ransomware ?

    IT Discussion
    9
    26
    3.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      Carnival Boy @scottalanmiller
      last edited by

      @scottalanmiller said in Are Servers on VMs are Safe from Ransomware ?:

      A chocolate torte can be super delicious, but it isn't a security tool.

      OK, now I'm hungry...

      1 Reply Last reply Reply Quote 3
      • PenguinWranglerP
        PenguinWrangler @scottalanmiller
        last edited by

        @scottalanmiller said in Are Servers on VMs are Safe from Ransomware ?:

        A chocolate torte can be super delicious, but it isn't a security tool.

        <tongue n cheek>If you were physically attacked and the attacker was allergic to chocolate, smashing it into his face could cause an anaphylactic shock thus saving you and thus being a darn good security tool.</tongue n cheek>

        That being said the easiest way to think about all of this is that a Virtual Machine is still a machine, right like a physical machine. You need the same protections for a VM that you would have for a physical machine. I think Scott covered the bases well.

        1 Reply Last reply Reply Quote 0
        • Mike DavisM
          Mike Davis
          last edited by

          I've seen two virtual machines get cryptoed, so no, it makes no difference. The recovery was quicker, but that's about it.

          1 Reply Last reply Reply Quote 1
          • wirestyle22W
            wirestyle22
            last edited by

            I think what he is really asking is if you have two VM's on the same hardware, does that open them up to ransomware because it's on the same machine?

            If a single VM is infected, that machine is infected. Ransomware will spread to any mapped drives, so hypothetically if you shared drives between these VM's it would absolutely infect anything shared between the infected machines even if they are VM's. They behave as independent machines as far as ransomware is concerned from what I have read.

            Please correct me if this is not the case ML.

            Mike DavisM 1 Reply Last reply Reply Quote 0
            • wirestyle22W
              wirestyle22
              last edited by

              It's also possible that he is actually referring to thin clients and not VM's

              1 Reply Last reply Reply Quote 0
              • dafyreD
                dafyre
                last edited by

                I take the stance of if it is a computer, and has an operating system, then yes, it can be affected by ransomware and I protect it as such.

                wirestyle22W 1 Reply Last reply Reply Quote 1
                • Mike DavisM
                  Mike Davis @wirestyle22
                  last edited by

                  In the case that someone shared from reddit yesterday, the hacker got on one system and then installed a password cracking tool on the VM to scan for other passwords on the network. To answer @openit 's question, it makes no difference physical or virtual.

                  So far we haven't seen a case where if a VM gets hacked the attacker gains access to the hyper visor unless passwords are shared, etc.

                  1 Reply Last reply Reply Quote 1
                  • wirestyle22W
                    wirestyle22 @dafyre
                    last edited by

                    @dafyre Yeah of course. My point is that is doesn't make it MORE susceptible to ransomware because it's sharing hardware. It is for all intents and purposes (ransomware wise) a standalone machine.

                    1 Reply Last reply Reply Quote 1
                    • Deleted74295D
                      Deleted74295 Banned
                      last edited by

                      There have been exploits in Xen & VMWare & Hyper-v where if a guest VM is breached, the attacker can get to the host and therefore, other VMs. @Mike-Davis

                      wirestyle22W Mike DavisM 2 Replies Last reply Reply Quote 0
                      • wirestyle22W
                        wirestyle22 @Deleted74295
                        last edited by

                        @Breffni-Potter said in Are Servers on VMs are Safe from Ransomware ?:

                        There have been exploits in Xen & VMWare & Hyper-v where if a guest VM is breached, the attacker can get to the host and therefore, other VMs. @Mike-Davis

                        Interesting. I'll have to look that up.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • Mike DavisM
                          Mike Davis @Deleted74295
                          last edited by

                          @Breffni-Potter Can you show some examples? I would have thought there would have been all out data center panic. Can you imagine one Azure VM having access to all the VMs on that host? I'm thinking that would be front page news.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • Deleted74295D
                            Deleted74295 Banned
                            last edited by Deleted74295

                            Different alerts have been posted on this site guys, This is why we update and patch and watch for notices from vendors.

                            Exploits have and are found on a regular basis, the vendors then patch like lightning to prevent it.

                            https://arstechnica.co.uk/security/2015/05/extremely-serious-virtual-machine-bug-threatens-cloud-providers-everywhere/

                            You can do your research and google your hypervisor of choice to see previous patched vulnerabilities.

                            Mike DavisM scottalanmillerS 2 Replies Last reply Reply Quote 1
                            • Mike DavisM
                              Mike Davis @Deleted74295
                              last edited by

                              @Breffni-Potter said in Are Servers on VMs are Safe from Ransomware ?:

                              Different alerts have been posted on this site guys, This is why we update and patch and watch for notices from vendors.

                              Exploits have and are found on a regular basis, the vendors then patch like lightning to prevent it.

                              https://arstechnica.co.uk/security/2015/05/extremely-serious-virtual-machine-bug-threatens-cloud-providers-everywhere/

                              You can do your research and google your hypervisor of choice to see previous patched vulnerabilities.

                              Thanks for sharing that. It seems an unpatched system is a vulnerability no matter where it is.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @wirestyle22
                                last edited by

                                @wirestyle22 said in Are Servers on VMs are Safe from Ransomware ?:

                                @Breffni-Potter said in Are Servers on VMs are Safe from Ransomware ?:

                                There have been exploits in Xen & VMWare & Hyper-v where if a guest VM is breached, the attacker can get to the host and therefore, other VMs. @Mike-Davis

                                Interesting. I'll have to look that up.

                                VMware had one happen just this past week.

                                1 Reply Last reply Reply Quote 1
                                • scottalanmillerS
                                  scottalanmiller @Mike Davis
                                  last edited by

                                  @Mike-Davis said in Are Servers on VMs are Safe from Ransomware ?:

                                  @Breffni-Potter Can you show some examples? I would have thought there would have been all out data center panic. Can you imagine one Azure VM having access to all the VMs on that host? I'm thinking that would be front page news.

                                  It was pretty big news last week when it was demonstrated on VMware. I've not heard of it on Xen.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @Mike Davis
                                    last edited by

                                    @Mike-Davis said in Are Servers on VMs are Safe from Ransomware ?:

                                    Thanks for sharing that. It seems an unpatched system is a vulnerability no matter where it is.

                                    That has always and will always be the case.

                                    1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller @Deleted74295
                                      last edited by

                                      @Breffni-Potter said in Are Servers on VMs are Safe from Ransomware ?:

                                      Different alerts have been posted on this site guys, This is why we update and patch and watch for notices from vendors.

                                      Exploits have and are found on a regular basis, the vendors then patch like lightning to prevent it.

                                      https://arstechnica.co.uk/security/2015/05/extremely-serious-virtual-machine-bug-threatens-cloud-providers-everywhere/

                                      You can do your research and google your hypervisor of choice to see previous patched vulnerabilities.

                                      Important to note that in this example, it was not the VMs or the hypervisors that were compromised. It was a shared storage device that was hit through the driver. It's a risk of loaded drivers and it was a floppy driver, so not expected to be seen in production.

                                      1 Reply Last reply Reply Quote 1
                                      • Oles BorysO
                                        Oles Borys
                                        last edited by

                                        Theoretically, the guest system is totally isolated by the VM and cannot even "see" the host, let alone attack it; so the guest cannot break out of the VM. Of course, in practice, it has occasionally happened. An attack requires exploiting a security issue (i.e. a programming bug which turns out to have nasty consequences) in the VM implementation or, possibly, the hardware features on which the VM builds on. There are few exit routes for data out of the VM; e.g., for Internet access, the VM is emulating a virtual network card, which deals only with the lowest level packets, not full TCP/IP -- thus, most IP-stack issues remain confined within the VM itself. So bugs leading to breakout from VM tend to remain rare occurrences.

                                        There are some kinds of attacks against which VM are very effective, e.g. fork bombs. From the point of view of the host system, the VM is a single process. A fork bomb in the guest will bring to its knees the scheduler in the guest OS, but for the host this will be totally harmless. Similarly for memory: the VM emulates a physical machine with a given amount of RAM, and will need about that amount of "real" RAM to back it up efficiently. Regardless of what the guest does, the VM will never monopolize more RAM than that. (You still want to limit VM RAM size to, say, at most 1/2 of your physical RAM size, because the extra "real" RAM is handy for disk caching; and the host OS will want to use some, too.)

                                        Taken into account that malware/ransomware is implemented on the file level, the best method of protection would be based on a block level recovery tool.

                                        In addition, the best way to overlook the possibility of loosing your data would be the implementation of the the 3-2-1 rule. Its a quite common safety measure in the data infrastructure. We actually implement it quite often, it is based on the replication of your data between 3 nodes as well as creating 2 real-time replication copies of the data between the nodes and storing a single copy of your data in a VTL on the cloud.

                                        For any other additional information, I would like to suggest you to take a look at the following article - https://knowledgebase.starwindsoftware.com/explanation/the-3-2-1-backup-rule/

                                        1 Reply Last reply Reply Quote 3
                                        • 1
                                        • 2
                                        • 1 / 2
                                        • First post
                                          Last post