Bonum Certa Men Certa

VENOM€® is Not a Serious Bug, It's Just a Marketing Campaign From CrowdStrike

Bugs
Image courtesy of Red Hat, demonstrating lack of correlation between severity and logos/brands



Summary: Many journalists bamboozled into becoming couriers of CrowdStrike, an insecurity firm which tries to market itself using a name and logo for a very old bug

THERE is a disproportionate level of coverage not of Free software but of bugs in Free software. We last wrote about it only days ago



A firm called CrowdStrike (who? Exactly!) is trying to emulate the 'success' of previous FUD campaigns. Now is the time to check who's a real journalist (fact-checking) and who's just serving PR campaigns like "VENOM", a shameless FUD campaign from CrowdStrike.

The whole "VENOM" nonsense was covered in a good article titled "VENOM hype and pre-planned marketing campaign panned by experts". To quote: "On Wednesday, CrowdStrike released details on CVE-2015-3456, also known as Venom. Venom is a vulnerability in the floppy drive emulation code used by many virtualization platforms.

"However, while it’s possible that a large number of systems are impacted by this flaw, it isn’t something that can be passively exploited.

"Several security experts discussed the flaw online, focusing on the marketing and the media attention that it generated – including some over-hyped headlines. Most media organizations were briefed ahead of time about the discovery and gagged by embargo until the Venom website launched, so they had plenty of time to write.

"Many media articles compared Venom to Heartbleed, which is an apples to oranges comparison. If anything, the only commonality is the fact that both flaws had a pre-planned marketing campaign."

Here comes the "Heartbleed" brand. Yet again. They're using names that are scary (even all caps, like "GHOST") because it's so much easier to sell than "CVE-2015-3456". Journalists rarely have the technical knowledge to analyse a bug or a flaw, so they assume bugs and logos are indicative of severity.

This patch Tuesday Microsoft revealed 40+ vulnerabilities. Not a single one had a brand name, logo, etc. Here is how IDG covered 46 flaws publicly disclosed by Microsoft just for this Tuesday (Microsoft hides even more flaws). So many flaws were collectively covered in one article and yet there are no logos; none has any branding.

"VENOM" has become the latest example of what we call bugs with branding. This has got to stop because it corrupts journalism and makes the field of computer security almost synonymous with marketing or advertising. CrowdStrike used ALL CAPS (for emphasis rather than acronym) and connotation with poison to market itself, an insecurity firm, after finding a floppy drive bug from over a decade ago. There is a logo too (the first example we found of it), not just branding for this bug, dubbed "VENOM".

Bug branding (turning number into branding-friendly FUD) seems to have adopted the ALL CAPS convention from "GHOST", only for extra scare. This FUD has surfaced even in Linux-centric sites, which played along with the marketing campaign. Red Hat [1] and SJVN [2], even Phoronix [3] and Softpedia [4], have covered it by now, despite no focus on security news there.

Branding for bugs leads to stupid headlines that are more poetic than factual and are very light on facts. There is little substance there. This whole recipe (bug+brand name+logo=lots of publicity without much merit) has been repeatedly exploited to give a bad name to FOSS security. A lot of headlines try to connect this to the "Heartbleed" brand. Headlines that we have found so far (links below) include "New Venom bug hits data centers, but it's hardly Heartbleed", "Venom bug could allow hackers to take over cloud servers - and experts say it could be worse than Heartbleed", "New Venom flaw may be worse than Heartbleed, researchers warn", and "Venom vulnerability more dangerous than Heartbleed, targets most virtual machines".

Zack Whittaker (former Microsoft staff) covered it like this in the CBS-owned tech tabloid, ZDNet: "Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters"

Here is that "Heartbleed" brand again. "Please Stop Comparing Every Security Flaw to Heartbleed," said one good headline from Gizmodo (that's just how they covered this marketing campaign).

The word/brand "Heartbleed" was made up by a Microsoft-connected firm. Watch coverage from Microsoft-friendly sites and you will find headlines like: "Heartbleed, eat your heart out: VENOM vuln poisons countless VMs"

Dan Goodin, a foe of FOSS (from a security angle), brings in the NSA and Bitcoin to add FUD amid this branded bug/buzz. He wrote about the latest branded bug not once but twice (see links below). He is squeezing the most FOSS FUD out of it (opportunism). Kim Komando chose the headline "New bug taking over the Internet". No sensationalism here? One press release said "Better Business Bureau Says Most Don't Need to Worry" [about the branded bug], so there is some objectivity out there too, or an effort to calm people down.

Watch carefully how the bug is marketed in the media: Logo with SVG-like transparency; for a bug! Looks like it was prepared by graphics/marketing professionals. Are insecurity firms now liaising with marketing firms to professionally draw SVG logos for bugs? More logos for simple bugs (we found several, but one main logo) are circulating, usually with photos of snakes. See the complete list [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36] as of this morning. How much more of this FUD is going to circulate before journalists realise that they make a mountain out of a molehill?

Related/contextual items from the news:


  1. VENOM, don’t get bitten.
    CVE-2015-3456 (aka VENOM) is a security flaw in the QEMU’s Floppy Disk Controller (FDC) emulation. It can be exploited by a malicious guest user with access to the FDC I/O ports by issuing specially crafted FDC commands to the controller. It can result in guest controlled execution of arbitrary code in, and with privileges of, the corresponding QEMU process on the host. Worst case scenario this can be guest to host exit with the root privileges.


  2. For Venom security flaw, the fix is in: Patch your VM today
    The QEMU fix itself is now available in source code. Red Hat has been working on the fix since last week.


  3. VENOM Bug In QEMU Escapes VM Security


  4. 11-Year-Old Bug in Virtual Floppy Drive Code Allows Escape from Virtual Machines
    Popular virtualization platforms relying on the virtual Floppy Disk Controller code from QEMU (Quick Emulator) are susceptible to a vulnerability that allows executing code outside the guest machine.




Recent Techrights' Posts

Twitter as X-Rated Hatred: Criticising Microsoft is Not OK, Calling for Beheadings (With Bounties on People's Heads) is OK
Twitter automation missed 'hit job' advertising
 
[Meme] A Question of Interests
'The Internet? We are not interested in it.' -Bill Gates, 1993
In the Romanian Browser Market, Microsoft is the 2% (Edge Down to 2.3%)
the Wintel era has ended
Microsoft Windows Falls to 19% in Congo, Only About 1 in 8 Windows Users (or 2-3% of Web Users) Are on Vista 11
The estimated share of Vista 11 fell sharply this past month
Gemini Links 17/08/2024: Selfishness and Offline BBSing
Links for the day
Frans Pop & Debian Day 2024: 31 years of deception and modern slavery
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, August 16, 2024
IRC logs for Friday, August 16, 2024
Links 16/08/2024: YouTube Bans and Surveillance Expanded
Links for the day
We Were Right All Along and the Collaborators of Microsoft Helped Competition Crimes of Microsoft
Once again vindicated regarding UEFI "secure boot"
[Meme] The New Windows Slogan
stat me up
Addendum: Associate's Notes on Free Software as a Labour Issue and the Connectivity Swindles
these are related issues/causes
Microsofters Infiltrating Roles of Authority and Government Positions to Protect Microsoft and to FUD Microsoft's Competition
friends of Microsofters who bully me and my wife
Links 16/08/2024: UK Skills Deficit and Kim Dotcom to be Extradited to the US (for Doing the Same Stuff GAFAM Does)
Links for the day
Gemini Links 16/08/2024: Overgeneralisation and Games
Links for the day
Russia's Yandex 5 Times Bigger Than Microsoft... in Ukraine
They'd rather rely on the Kremlin than on Microsoft
[Meme] Gemini is Different, So What?
different, not worse
Now It's "Official": Over 4,000 Known Gemini Capsules in Lupa
For the first time ever
Clown Computing
Reprinted with permission from Dr. Andy Farnell
[Meme] What Freedom Means to IBM
Free labou
Balancing Activism Against (or With) Basic Necessities and Daniel Cantarín on Our Collective Battle for Software Freedom Around the World
"I'm VERY angry about lots of stuff happening here in Argentina, all of it shielded behind the word "freedom"."
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, August 15, 2024
IRC logs for Thursday, August 15, 2024
From 99% in 2012 to 27% in 2024: How Microsoft Lost Georgia
What we're seeing is a migration from Windows to other platforms, notably GNU/Linux
To Understand Cisco's Mass Layoffs Look at the Company's Soaring Debt (Same at Microsoft)
Look what's happening to Intel - down almost 60% since the start of the year, 57% to be precise
Windows Flying Low at 25%
It's another all-time low
[Meme] Long Texts You Never Bother Reading (Because Life is Too Short, Unlike Those Texts)
The devil is in the terms of service
Links 15/08/2024: Monkeypox Hysteria and Modern Homesteaders Living Off the Grid
Links for the day
Gemini Links 15/08/2024: Confession of a Convention Game Master and Some Release nostalgia
Links for the day
Congratulations to Romania, Where Windows is Now "Minority Market Share" Platform
Time will tell if GNU/Linux can pass 5% on the desktop/laptop "form factor" there
Why It Matters That 4,000 Gemini Capsules Are Known to Lupa and Why Gemini Protocol Matters to Us
I have no doubt Gemini Protocol will continue to expand because it solves a real problem
Links 15/08/2024: Avast Surveillance Scandal Unsolved and Facebook Still Censors Terror Sympathisers
Links for the day
Daniel Cantarín's Response to Alexandre Oliva's Talk on Achieving Software Freedom in the Age of Platform Decay
Soylent News caught up with the series
4,000 Gemini Capsules
it's basically one capsule short of 4,000
"Microsoft is a Sponsor of The New Stack."
Many articles turn out to be just ads
New Highs for Android in Russia, But It's Reportedly Working on Its Own Linux-Based Operating Systems (GAFAM-Free)
statCounter isn't equipped to properly parse user agents or to keep up
Upcoming Series: Terms of Service (TOS) Under the Microscope, FSF Party, GitHub Scandals, Clowns, and More
Right now we have way more material than we have time to cover. But that's a good thing.
Gemini Links 15/08/2024: Lies of Therapy and Web Applications
Links for the day
Software Freedom in Perspective - Part 5 - When Richard Stallman Came to Argentina
It might seem a bit harsh, but a discussion at the end of this series will tie things together and explain why those things were said
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, August 14, 2024
IRC logs for Wednesday, August 14, 2024