Zombies!

Zombies!

Marko Helenius
Marko Helenius

2 Jun 2019

2 min read

In the beginning of 2018 vulnerabilities like Spectre [1] and Meltdown changed the world of computing. They were from the family of next generation vulnerabilities, found in CPU hardware layer, instead of the traditional defects existing in computing software layer. What makes these CPU vulnerabilities more serious and dangerous is the fact that they exists in the hardware layer underneath the workload and even the operating system. Situation is extremely critical in virtualized environments, for example in the Cloud, where multiple tenants operate in same resources seamlessly. In May 2019 Intel announced a new set of vulnerabilities similar to Spectre and Meltdown, called Microarchitectural Data Sampling (MDS). All previously mentioned vulnerabilities reside in Intel CPUs (Cores and Xeon) and particularry in Intel implementation of Hypertreading and speculative execution. Exploiting these vulnerabilities, attacker can obtain leaked data across processes, privilege boundaries and Hyperthread. As this feature resides in the hardware itself, all know operating systems, all hypervisors and container solutions running on top of Intel processor are affected. How to mitigate Zombie(load)s [Z] in the Cloud? If you run untrusted or unpatched software stack, multiple tenants and/or services open to the Internet, you have increased risk of being bit by a Zombieload. Here is a list of steps we have performed for our customers to mitigate Zombies:

Share this post

Marko Helenius

Marko Helenius

Field Notes

Related Articles

Continue exploring cloud technology and best practices

Zombies!

Security

3 min read

Alert fatigue in SOCs: Why fewer alerts lead to better security

Alert fatigue is rarely caused by analysts. It is caused by how the SOC is designed. Effective security operations are built on fewer, better alerts.

Read more
Zombies!

Cloud

8 min read

Digital Sovereignty by Design: Protecting the Agility That Makes Cloud Valuable

Sovereignty by design means building the controls that let you use the cloud on your terms – keeping access, agility, and innovation while meeting every regulatory and business requirement.

Read more
Zombies!

Security

5 min read

The modern SOC: Rethinking security operations in a cloud-first world

Traditional SOC models struggle to keep pace with cloud, identity, and distributed work. Modern SOCs are about clarity of thinking, not scale of analysts.

Read more

Ready to discuss your cloud strategy?

Let's talk about how Cloud2 can help your organization.

Field Notes

Stay ahead of the cloud

Practical insights on AWS, Azure, security and AI. Delivered to your inbox.

No spam. Unsubscribe any time.