Hyperjacking is an attack in which a hacker takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host.[1] The point of the attack is to target the operating system that is below that of the virtual machines so that the attacker's program can run and the applications on the VMs above it will be completely oblivious to its presence.
^"HYPERJACKING". Telelink. Archived from the original on 27 February 2015. Retrieved 27 February 2015.
machine escape "HYPERJACKING". Telelink. Archived from the original on 27 February 2015. Retrieved 27 February 2015. Gray, Daniel. "Hyperjacking - Future Computer...
Security, run by the international human rights organization Access Now. Hyperjacking Whonix The base (dom0) operating system used by Qubes OS is Fedora (source)...
installing themselves as a hypervisor below the operating system, known as hyperjacking, can make them more difficult to detect because the malware could intercept...
huge stores of information through a single attack—a process he called "hyperjacking". Some examples of this include the Dropbox security breach, and iCloud...
driver, xHCI/EHCI, PVNVRAM, and vmxnet3 can cause virtual machine escape Hyperjacking "What is VM Escape? - The Lone Sysadmin". 22 September 2007. "Virtual...