The top 12 security stories of 2016

Stuart Sumner
clock • 16 min read

Most of us thought 2015 was the year of the data breach, but then 2016 happened. 2017 has a job to do if it wants to continue the trend

'Dirty COW' Linux kernel security vulnerability being exploited in the wild, warns Red Hat

Photo of a Highland Cow against a Scottish mountain backdrop

In October a Linux kernel security flaw - dubbed ‘Dirty COW' - was found being exploited ‘in the wild', as open source software vendor Red Hat warned, with users urged at the time to update their systems as soon as possible. 

The flaw and its exploitation was uncovered by Linux security researcher Phil Oester, who claimed that the exploit is easy to execute and will almost certainly become more widely used. A patch was soon rushed out.

"The exploit in the wild is trivial to execute, never fails and has probably been around for years - the version I obtained was compiled with gcc 4.8," he said.

"As Linus [Torvalds] notes in his commit, this is an ancient bug and impacts kernels going back many years. All Linux users need to take this bug very seriously, and patch their systems ASAP."

Oester said that he uncovered the exploit for the bug, which has been around since 2007, while examining a server that appeared to have been attacked.

"One of the sites I manage was compromised, and an exploit of this issue was uploaded and executed. A few years ago I started packet capturing all inbound HTTP traffic and was able to extract the exploit and test it out in a sandbox," he said.

"These rolling packet captures have proved invaluable numerous times. I would recommend this extra security measure to all admins."

The Dirty COW moniker was applied as a descriptive of the security flaw: "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings.

"An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system," Red Hat warned.

You may also like
Accidental exclusion exacerbating cyber's staffing problem

Careers and Skills

Many people who would excel in cybersecurity roles see no obvious way in, with those that do make it getting stuck in entry-level positions

clock 12 May 2023 • 4 min read
Former Head of Police National Cyber Crime Unit joins Cybersecurity Festival

Leadership

Charlie McMurdie spent 32 years in the Met and built the Police Central e-crime Unit

clock 29 March 2023 • 2 min read
Security challenges: Five midsize IT leaders on where they need help

Security

From ransomware and malware to the Internet of Things, midmarket IT leaders are staring down a number of security threats, often with limited resources at hand.

clock 28 March 2023 • 8 min read

More on Security

You need to lock down cyber-physical systems: Here's how and why

You need to lock down cyber-physical systems: Here's how and why

Cybersecurity should focus on OT as well as IT

Samara Lynn
clock 27 March 2024 • 3 min read
China Crisis: Government blames China for Electoral Commission cyberattack

China Crisis: Government blames China for Electoral Commission cyberattack

Also accuses Chinese state-affiliated actors of trying to hack MPs emails

Penny Horwood
clock 26 March 2024 • 5 min read
A cyber-focused attorney on why 'Data is the hot potato'

A cyber-focused attorney on why 'Data is the hot potato'

Shawn Tuma, partner and co-chair of the data privacy and cybersecurity practice group at Spencer Fane LLP, shares some tips on cybersecurity for companies to follow.

Samara Lynn
clock 26 March 2024 • 3 min read