Ransomware Gangs Exploit VMware ESXi Authentication Bypass in Attacks

VMWare

Ransomware Gangs Exploit VMware ESXi Authentication Bypass in Attacks

Microsoft has recently issued a warning about ransomware gangs exploiting a vulnerability in VMware ESXi’s authentication system. This flaw, identified as CVE-2024-37085, allows attackers to gain full administrative access to ESXi hypervisors, posing a significant threat to organizations using this technology.

R-5-1024x376 Ransomware Gangs Exploit VMware ESXi Authentication Bypass in Attacks

The Vulnerability

The vulnerability lies in the way ESXi hypervisors handle authentication. Attackers can create a new user in an “ESX Admins” group, which automatically grants full administrative privileges. This flaw requires high privileges on the target device and user interaction, but once exploited, it allows attackers to control the hypervisor completely.

Exploitation by Ransomware Gangs

Several ransomware gangs, including Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest, have been observed exploiting this vulnerability. These groups have used the flaw to deploy ransomware such as Akira and Black Basta, leading to significant disruptions for affected organizations.

Attack Methodology

The attackers typically gain initial access through methods like phishing or exploiting other vulnerabilities. Once inside the network, they use tools like Cobalt Strike and Pypykatz to steal credentials and move laterally. By exploiting the ESXi vulnerability, they can encrypt the file system of the hypervisor, affecting the hosted virtual machines and potentially exfiltrating data.

Impact on Organizations

The exploitation of this vulnerability can have severe consequences. ESXi hypervisors often host critical applications and data, so gaining control over them can lead to major outages and business disruptions. The attackers can encrypt files and backups stored on the hypervisor, severely limiting recovery options for the victims.

Mitigation and Protection

Microsoft has disclosed this vulnerability to VMware, which has released a security update to address the issue. Organizations using ESXi hypervisors are strongly advised to apply these updates promptly. Additionally, following best practices for network security, such as regular patching and monitoring for unusual activity, can help mitigate the risk of such attacks.

Conclusion

The exploitation of the VMware ESXi authentication bypass by ransomware gangs highlights the importance of robust security measures and timely updates. Organizations must remain vigilant and proactive in protecting their critical infrastructure from such sophisticated threats.

By understanding the nature of this vulnerability and taking appropriate actions, organizations can better defend against these malicious attacks and ensure the continuity of their operations.


You think you have a story worth everyone’s time? SUBMIT A STORY and we will publish it

Share this content:

1 comment

comments user
Dreamproxies.com

I absolutely love your blog and find most of your post’s to be exactly I’m looking for. Does one offer guest writers to write content to suit your needs? I wouldn’t mind composing a post or elaborating on a lot of the subjects you write with regards to here. Again, awesome site!

Post Comment