Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language.

We coin ‘Ahoi,’ an anagram of ‘Iago,’ to pay tribute to research on interface attacks with TEEs.

Confidential computing, also referred to as trusted execution, protects sensitive computations on public cloud platforms. 

Hardware vendors provide trusted hardware that guarantees user code and data security from malicious actors.

Ahoi Attacks

Cloud providers now offer confidential computing via technologies like Intel SGX for process-level isolation and AMD SEV, Intel TDX, and ARM CCA for VM-level isolation as Confidential VMs (CVMs). 

SGX enclaves isolate single processes from other processes/OS, while CVMs allow deploying entire isolated VMs inaccessible to other tenants, provider’s hardware/software like hypervisors.

Document
Stop Advanced Phishing Attack With AI

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

CVMs enable better cloud-native confidential computing abstraction than SGX’s process-level model.

Interrupt management is done almost entirely by the hypervisor in CVMs. CVM security can be breached by Ahoi attacks using notifications.

The hypervisor virtualizes the delivery of interrupts necessary for the operation of CVMs.

This hooks physical interrupts, redirects them to corresponding virtual machines, and raises virtual interrupts.

As a result, the guest OS within this CVM handles these interrupts via their handlers and ultimately acknowledges them.

The hardware exception is mapped in “x86” to the interrupts 0 through 31.

An example of this is when a divide-by-zero occurs and raises interrupt 0, which the OS converts to SIGFPE for user-space delivery.

Applying for a custom handler is like calculating the non-weighted average of SIGFPE.

Ahoi attacks have virtual CPUs that are attacked using a hypervisor to inject malicious interrupts into them, which helps invoke interrupt handlers globally.

Execution flow leading to successful authentication (Source – Github)

Ahoi attacks can take advantage of the interrupts and signals, which were made for trusted hypervisor environments.

Projects like Heckler can demonstrate this, as they have demonstrated how to breach AMD SEV-SNP and Intel TDX to gain unauthorized access to CVMs. 

Moreover, such vulnerabilities extend even up to specialized interrupt interfaces such as AMD SEV’s VMM Communication Exception (#VC) meant for safe hypervisor-CVM communication. 

However, this interface can be used by hypervisors to perform malicious tasks that are executed without being caught by CVMs.

WeSee exploits AMD SEV-SNP’s flaws to do forbidden things on CVMs.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

2 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

2 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

2 hours ago

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…

2 hours ago

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…

2 hours ago

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…

2 hours ago