Feeds

VMware confirms ESX source code had been stolen and published

Penetration from Hardcore Charlie

Next gen security for virtualised datacentres

VMware has confirmed that software posted online is part of the source code for its ESX hypervisor and has warned that more code could be released.

The code was posted by a hacker calling himself Hardcore Charlie and may come from military contractor China National Import & Export Corp (CEIEC), which he claimed to have successfully breached earlier in the month and downloaded over a terabyte of information. The CEIEC has denied that its servers were breached.

VMware source code

An excerpt of the stolen code

"The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers," said Iain Mulholland, director of VMware's Security Response Center in a blog posting.

"VMware proactively shares its source code and interfaces with other industry participants to enable the broad virtualization ecosystem today. We take customer security seriously and have engaged internal and external resources to thoroughly investigate."

While the admission is embarrassing for VMware there may be more code to come from other vendors. Hardcore Charlie has said on his Twitter feed that he also has EMC code that will be put up online at a later date.

"Because of this success, virtual infrastructure is a prime target for attack – so the theft of VMware ESX source code, similar to RSA's breach last year, is no surprise," said Eric Chiu, president of cloud vendor HyTrust. "Platform security for virtual infrastructure is a must -- without securing the virtual infrastructure, enterprises are leaving a huge area of their datacenter open to attack." ®

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.