May 14, 2015 By Shane Schick 2 min read

There have always been concerns about the security of cloud computing environments, but recent news regarding the so-called VENOM flaw may send some organizations into full-blown panic mode.

An acronym for “virtualized environment neglected operations manipulation,” the VENOM flaw was first discovered by researchers at a firm called CrowdStrike based in Irvine, California. The issue stems from a problem in the code for virtual floppy disk controllers in an open-source technology called QUEMU, which serves as a sort of window or hypervisor in virtual machine environments. While floppy drives are ancient history to many IT administrators, hackers could still use the exploit to penetrate systems that use common tools to virtualize their IT infrastructure, provided they have root or admin permissions.

ZDNet reported that major open source organizations have been quick to offer patches, including Red Hat Software, Xen and those behind the QUEMU project itself. In some cases, making the necessary changes will involve executing a series of commands and even powering-off virtual machine guests, which could have an operational impact in some organizations. Of course, that’s still preferable to a cybercriminal taking advantage of the VENOM flaw, which could threaten an enormous number of data centers.

The nature of the VENOM flaw quickly drew comparisons with last year’s Heartbleed, but in some respects it may be even worse. That’s because, as Fortune explained, there has long been a sense that virtualization technology allowed companies to isolate virtual machines in a way that would make them safer. If hackers know what they’re doing, they could use a bug like this to overwrite parts of a machine’s memory, execute code and do other damage.

Given that virtual machines allow companies to host compute resources on behalf of other firms, the VENOM flaw could also tarnish the reputations of major cloud computing firms. VentureBeat noted that Amazon, Rackspace and Google were all quick to reassure customers and prospects that their data centers are not at risk or that they had already addressed the vulnerability. Still, there may be questions about how they stay on top of potential bugs like this and how quickly they can plug any holes.

On the other hand, it’s important to stress that there have been no reports of the VENOM flaw leading to any actual data theft, and CSO Online suggested the hype and “marketing” around the potential danger has already gotten out of hand. For most organizations, however, it only takes being bitten once by a major security problem to become twice shy.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today