H
H
Hint2018-02-19 16:19:50
VMware
Hint, 2018-02-19 16:19:50

How likely is it that a Trojan on Windows will steal data from a VM (vmware) on Linux?

There is a home computer with Windows 10, which is used by not very experienced relatives who can potentially pick up some kind of infection on the Internet. I occasionally have to work on this computer, enter passwords, open ssh connections, and so on. I wanted to somehow protect myself with little blood. I decided to install vmware, run Ubuntu in it and work exclusively in it. How much safer would that be? Or has malware been able to interact with virtual machines for a long time and extract the necessary information from there (browser cookies, saved passwords, etc.)? It is clear that you can fully control the virtual machine from the host. And it is clear that in the case of a targeted attack, all this will not help. But we are talking about some random infections. I do not want to install a separate full-fledged OS for the sake of 5 minutes of work per month.

Answer the question

In order to leave comments, you need to log in

6 answer(s)
B
Boris Syomov, 2018-02-19
@kotomyava

Arbitrary - extremely unlikely.
In the end, just encrypt the Linux partition with regular means and sleep peacefully... =)

C
CityCat4, 2018-02-19
@CityCat4

Spectra can. But from the concept that scared the world at the beginning of January to a really applicable virya, there is a very long way.
And so - well, let's say it ranges from "almost impossible" to "almost unbelievable."

S
Stanislav Bodrov, 2018-02-20
@jenki

Unlikely. In the case when a targeted attack on a known case.
The host machine is isolated from what is happening in the virtual machine. The virtual one is isolated from everything happening in the host. Therefore, the attacker needs to know the version of the virtual machine installed on the host, the version of the OS installed in the virtual machine. Then, in the virtual machine, look for passwords with keys. Too much hassle.

R
Roman Molchanov, 2018-02-20
@Dobryak88

Hypothetically, a keylogger on the host system would see passwords entered into the hypervisor console. The probability of this is not high and the profit of a random attacker, I think, is low, but possible.
Artem Stanislav Bodrov , correct me if I'm wrong.

U
UndefinedBehaivor, 2018-02-23
@UndefinedBehaivor

With mass malware, almost zero. On the masses, everyone doesn’t care about single zadrs and all sorts of cryptomaniacs, they don’t even bother with normal autorun there.
Targeted is also almost zero, because the chance that someone with such capabilities needs you is very low.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question