The Register® — Biting the hand that feeds IT

Feeds

VMware confirms ESX source code had been stolen and published

Penetration from Hardcore Charlie

Email delivery: Hate phishing emails? You'll love DMARC

VMware has confirmed that software posted online is part of the source code for its ESX hypervisor and has warned that more code could be released.

The code was posted by a hacker calling himself Hardcore Charlie and may come from military contractor China National Import & Export Corp (CEIEC), which he claimed to have successfully breached earlier in the month and downloaded over a terabyte of information. The CEIEC has denied that its servers were breached.

VMware source code

An excerpt of the stolen code

"The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers," said Iain Mulholland, director of VMware's Security Response Center in a blog posting.

"VMware proactively shares its source code and interfaces with other industry participants to enable the broad virtualization ecosystem today. We take customer security seriously and have engaged internal and external resources to thoroughly investigate."

While the admission is embarrassing for VMware there may be more code to come from other vendors. Hardcore Charlie has said on his Twitter feed that he also has EMC code that will be put up online at a later date.

"Because of this success, virtual infrastructure is a prime target for attack – so the theft of VMware ESX source code, similar to RSA's breach last year, is no surprise," said Eric Chiu, president of cloud vendor HyTrust. "Platform security for virtual infrastructure is a must -- without securing the virtual infrastructure, enterprises are leaving a huge area of their datacenter open to attack." ®

5 ways to reduce advertising network latency

Whitepapers

Microsoft’s Cloud OS
System Center Virtual Machine manager and how this product allows the level of virtualization abstraction to move from individual physical computers and clusters to unifying the whole Data Centre as an abstraction layer.
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Supercharge your infrastructure
Fusion­‐io has developed a shared storage solution that provides new performance management capabilities required to maximize flash utilization.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Avere FXT with FlashMove and FlashMirror
This ESG Lab validation report documents hands-on testing of the Avere FXT Series Edge Filer with the AOS 3.0 operating environment.

More from The Register

next story
Multipath TCP: Siri's new toy isn't a game-changer
This experiment is an alpha and carriers could swat it like a bug
Barmy Army to get Wi-Fi to the seat for cricket's Ashes
Sydney Test Match will offer replays to the smartmobe
Microsoft follows Amazon in gaining critical US gov certification
Redmond zooms onto FedRAMP, but where's Google?
Dedupe-dedupe, dedupe-dedupe-dedupe: Flashy clients crowd around Permabit diamond
3 of the top six flash vendors are casing the OEM dedupe tech, claims analyst
Seagate to storage bods: You CAN touch this (at last). Stop, HAMR time
We've talked about it for a while... next month, you'll actually *see* it
Disk-pushers, get reel: Even GOOGLE relies on tape
Prepare to be beaten by your old, cheap rival
Dragons' Den star's biz Outsourcery sends yet more millions up in smoke
Telly moneybags went into the cloud and still nobody's making any profit
prev story