Gds

Vulnerability updated 2 months ago (2024-11-29T13:39:51.960Z)
Download STIX
Preview STIX
The Gather Data Sampling (GDS) vulnerability, a flaw in software design or implementation that allowed users to exfiltrate AES 128-bit and 256-bit cryptographic keys on a separate virtual machine (VM), has significantly impacted the cybersecurity landscape. This vulnerability was combined with the Load Value Injection (LVI) technique, revealed in 2020, to form the Gather Value Injection (GVI) method. A series of cyberattacks exploiting this vulnerability were carried out between September 2021 and January 2023, targeting GDS Holdings and ST Telemedia Global Data Centers (STT GDC). These attacks negatively impacted major customers, including Amazon and Walmart, by compromising login credentials for customer-support websites. In response to these attacks, GDS and STT GDC changed customer passwords in late January. However, shortly after, Resecurity, a cybersecurity research firm, identified hackers offering the stolen databases for sale on a dark web forum. The hackers provided screenshots showing them accessing accounts for five companies via the GDS and STT GDC online portals. Resecurity alerted GDS, STT GDC, and a small number of its own clients about the breach. Approximately 2,000 customers of GDS and STT GDC were affected by these security incidents. Mitigation measures have been implemented to partially protect against GDS and GVI attacks, although these are not without drawbacks. Disabling simultaneous multithreading (SMT), for example, can partially mitigate these attacks but comes with a 30% loss in performance, and leaks across context switching still occur. Despite these challenges, the importance of addressing such vulnerabilities is underscored by the global reliance on large-scale genomic datasets, such as those accessed through the NIH GDS program, which hold transformative potential for scientific discovery and healthcare advancements.
Description last updated: 2024-05-04T16:13:32.108Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
Encryption
Resecurity
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Gds Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
2 years ago
Securityaffairs
a year ago
CSO Online
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago