

Multiple Cisco Products Vulnerabilities
January 27, 2025
Stealc Information Stealer Malware – Active IOCs
January 27, 2025
Multiple Cisco Products Vulnerabilities
January 27, 2025
Stealc Information Stealer Malware – Active IOCs
January 27, 2025Severity
High
Analysis Summary
Ransomware actors are increasingly targeting VMware ESXi bare-metal hypervisors due to their critical role in hosting multiple virtual machines on a single server, which makes them pivotal in virtualized environments. These appliances are often unmonitored, making them attractive targets for attackers who exploit known vulnerabilities or compromised administrator credentials to gain access. Once inside, attackers can encrypt files and steal data, crippling businesses by rendering all hosted virtual machines inaccessible.
According to the Researcher, attackers abuse the ESXi hypervisor’s built-in SSH service, typically used by administrators for remote management, to establish persistence and deploy ransomware. Using SSH tunneling, they create a stealthy connection to command-and-control (C2) servers, which remains semi-persistent due to ESXi appliances’ reliability and infrequent reboots. For example, attackers utilize commands like ssh –fN -R to set up reverse port forwarding, ensuring they can operate undetected in many environments where SSH activity is not actively monitored.

Detecting these threats is challenging due to ESXi's decentralized logging structure. Logs are scattered across files such as /var/log/shell.log, /var/log/hostd.log, /var/log/auth.log, and /var/log/vobd.log, which collectively track shell commands, administrative activities, login attempts, and firewall modifications. These logs are essential for identifying anomalies but are often targeted by attackers who clear or modify them to erase evidence of their activities, adding further complexity to investigations.
To mitigate these risks, organizations should centralize ESXi logs through syslog forwarding and integrate them into a Security Information and Event Management (SIEM) system to enhance visibility and detect anomalies. Proactive monitoring, alongside regular patching and strict credential management, is crucial to preventing ransomware actors from exploiting ESXi appliances and gaining long-term persistence within corporate networks.
Impact
- Sensitive Data Theft
- Gain Access
Remediation
- Forward ESXi logs to a central syslog server.
- Integrate logs into a Security Information and Event Management (SIEM) system to detect anomalies and enhance visibility.
- Review critical log files for suspicious activities.
- Look for evidence of unauthorized SSH activity and firewall modifications.
- Disable ESXi's SSH service when not in use.
- Restrict SSH access to specific IP addresses through firewall rules.
- Use strong, unique passwords and multi-factor authentication for administrative accounts.
- Patch known vulnerabilities in ESXi hypervisors promptly.
- Ensure all VMware tools and management interfaces are updated to the latest versions.
- Set up alerting for suspicious login attempts or firewall changes.
- Conduct regular forensic investigations to validate log integrity and detect tampering.
- Enforce the principle of least privilege for all accounts.
- Regularly audit administrator accounts and disable unused or compromised credentials.
- Use secure configurations as per VMware’s best practices.
- Isolate ESXi management interfaces on a separate network.
- Maintain regular, offline backups of virtual machines and configurations.
- Test backup restoration processes to ensure business continuity in case of a ransomware attack.