Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 14, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 14, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 14, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 14, 2025

      I test a lot of AI coding tools, and this stunning new OpenAI release just saved me days of work

      May 14, 2025

      How to use your Android phone as a webcam when your laptop’s default won’t cut it

      May 14, 2025

      The 5 most customizable Linux desktop environments – when you want it your way

      May 14, 2025

      Gen AI use at work saps our motivation even as it boosts productivity, new research shows

      May 14, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Strategic Cloud Partner: Key to Business Success, Not Just Tech

      May 14, 2025
      Recent

      Strategic Cloud Partner: Key to Business Success, Not Just Tech

      May 14, 2025

      Perficient’s “What If? So What?” Podcast Wins Gold at the 2025 Hermes Creative Awards

      May 14, 2025

      PIM for Azure Resources

      May 14, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 24H2’s Settings now bundles FAQs section to tell you more about your system

      May 14, 2025
      Recent

      Windows 11 24H2’s Settings now bundles FAQs section to tell you more about your system

      May 14, 2025

      You can now share an app/browser window with Copilot Vision to help you with different tasks

      May 14, 2025

      Microsoft will gradually retire SharePoint Alerts over the next two years

      May 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ransomware Actors Exploit VMware ESXi Hypervisor Bug: Microsoft

    Ransomware Actors Exploit VMware ESXi Hypervisor Bug: Microsoft

    July 29, 2024

    Microsoft researchers have observed multiple ransomware operators exploiting a recently patched vulnerability in ESXi hypervisors to gain full administrative control over domain-joined ESXi servers. This flaw, tracked as CVE-2024-37085, grants these threat actors the ability to encrypt file systems and disrupt critical virtual machines.

    ESXi hypervisors, bare-metal hypervisors directly installed onto physical servers, host virtual machines essential to network operations. Gaining administrative permissions on these hypervisors gives ransomware operators the leverage to halt operations and potentially exfiltrate data.

    How Ransomware Gangs are Exploiting the VMware ESXi Bug

    The vulnerability resides in a domain group named “ESX Admins.” By default, any member of this group receives full administrative access to the ESXi hypervisor, without proper validation. This group doesn’t exist by default in Active Directory, yet ESXi hypervisors treat it as a legitimate admin group if created.

    Microsoft disclosed this flaw to VMware via Coordinated Vulnerability Disclosure (CVD), leading VMware to release a security update. Microsoft advises ESXi server admins to apply these updates immediately to safeguard their systems.

    Ransomware operators like Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest have already leveraged this technique. These operators have deployed ransomware such as Akira and Black Basta in numerous attacks, exploiting this vulnerability to create the “ESX Admins” group and adding themselves to it, thus gaining elevated privileges.

    Storm-0506 attack chain (Source: Microsoft)

    Further analysis revealed multiple methods to exploit this vulnerability. Threat actors could create the “ESX Admins” group, rename existing groups, or manipulate privilege refreshes to maintain control. Even when admins assign different groups for management, the hypervisor may still recognize the “ESX Admins” group, allowing continued exploitation.

    In one incident, Storm-0506 used this flaw to deploy Black Basta ransomware against a North American engineering firm. The attackers first gained access via a Qakbot infection, then escalated privileges using another Windows vulnerability (CVE-2023-28252). With tools like Cobalt Strike and Pypykatz, they stole domain admin credentials, moved laterally across the network, and created the “ESX Admins” group to control the ESXi hypervisors.

    This breach resulted in the encryption of the ESXi file system and disruption of hosted virtual machines. Although the attackers also targeted non-ESXi devices with PsExec, Microsoft Defender Antivirus thwarted these attempts on protected devices.

    How to Mitigate these Attacks Against ESXi Servers

    Hypervisors have become a preferred choice of target in the past few years for ransomware operators because of the following factors:

    Many security products have limited visibility and protection for an ESXi hypervisor.
    Encrypting an ESXi hypervisor file system allows one-click mass encryption, as hosted VMs are impacted. This could provide ransomware operators with more time and complexity in lateral movement and credential theft on each device they access.

    To mitigate such attacks, Microsoft recommends organizations follow several protective measures. Key steps include:

    Install Security Updates: Apply VMware’s latest security updates on all domain-joined ESXi hypervisors. If updates are not feasible, validate and harden the “ESX Admins” group, deny access through ESXi settings, or change the admin group.
    Credential Hygiene: Enforce multifactor authentication (MFA), adopt passwordless methods, and separate privileged accounts from regular productivity accounts. This minimizes the risk of privilege escalation by threat actors.
    Monitor and Detect: Implement custom detections in extended detection and response (XDR) or security information and event management (SIEM) systems for new group names. Ensure ESXi logs are sent to a SIEM for monitoring suspicious activities.
    Protect Critical Assets: Regularly update and monitor critical assets like ESXi hypervisors and vCenters. Ensure robust backup and recovery plans are in place to mitigate potential disruptions.

    Microsoft continues to emphasize the importance of collaboration among researchers, vendors, and the security community. Sharing intelligence and advancing defenses is crucial to protect users and organizations from evolving threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleU.S. Department of Justice Urges Court to Reject Appeal Challenging TikTok Ban
    Next Article Researchers Study Evolution of Ransomware Gang UNC4393’s Campaigns After QAKBOT Takedown

    Related Posts

    Machine Learning

    Georgia Tech and Stanford Researchers Introduce MLE-Dojo: A Gym-Style Framework Designed for Training, Evaluating, and Benchmarking Autonomous Machine Learning Engineering (MLE) Agents

    May 15, 2025
    Machine Learning

    A Step-by-Step Guide to Build an Automated Knowledge Graph Pipeline Using LangGraph and NetworkX

    May 15, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Brazil Halts Meta’s AI Data Processing Amid Privacy Concerns

    Development

    Creating bespoke programming languages for efficient visual AI systems

    Artificial Intelligence

    Building Gen AI-Powered Predictive Maintenance with MongoDB

    Databases

    Intel Labs Introduce RAG Foundry: An Open-Source Python Framework for Augmenting Large Language Models LLMs for RAG Use Cases

    Development

    Highlights

    Coaction – High-Performance, Multithreading-Ready State Management

    December 20, 2024

    Comments Source: Read More 

    Breaking down CPU speed: How utilization impacts performance

    November 25, 2024

    GitHub for Beginners: Building a React App with GitHub Copilot

    May 12, 2025

    Protecting Your Participants’ Data: A ReOps-Approved Guide for Researchers

    May 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.