Neue Malware-Familien gefunden, die auf VMware ESXi-Hypervisoren abzielen

Teilen:

Threat actors have been found deploying never-before-seen post-compromise implants in VMware’s virtualization software to seize control of infected systems and evade detection.

Google‘s Mandiant threat intelligence division referred to it as a “novel malware ecosystem” that impacts VMware ESXi, Linux vCenter servers, and Windows virtual machines, allowing attackers to maintain persistent access to the hypervisor as well as execute arbitrary commands.

Die hyperjacking attacks, per the cybersecurity vendor, involved the use of malicious vSphere Installation Bundles (VIBs) to sneak in two implants, dubbed VIRTUALPITA and VIRTUALPIE, on the ESXi hypervisors.

“It is important to highlight that this is not an external remote code execution vulnerability; the attacker needs admin-level privileges to the ESXi hypervisor before they can deploy malware,” Mandiant researchers Alexander Marvi, Jeremy Koppen, Tufail Ahmed, and Jonathan Lepore said in an exhaustive two-part Bericht.

There is no evidence that a zero-day vulnerability was exploited to gain access to ESXi servers. That said, the use of trojanized VIBs, a software package format used to facilitate software distribution and virtual machine management, points to a new level of sophistication.

“The threat actor had prior access to the victim environments through attack techniques unrelated to VMware,” Marvi told The Hacker News. “With their established network access, they identified and stole VMware administrator credentials and used it to log into the ESXi servers and deploy the malicious VIB files.”

“This malware differs in that it supports remaining both persistent and covert, which is consistent with the goals of larger threat actors and APT groups who target strategic institutions with the intention of dwelling undetected for some time,” VMware disclosed.

While VIRTUALPITA comes with capabilities to execute commands as well as carry out file upload and download, VIRTUALPIE is a Python backdoor with support for command line execution, file transfer, and reverse shell features.

Also uncovered is a malware sample called VIRTUALGATE in Windows guest virtual machines, which is a C-based utility program that executes an embedded payload capable of using VMware’s virtual machine communication interface (VMCI) sockets to run commands on a guest virtual machine from a hypervisor host.

According to Marvi, the malware is said to have been deployed at fewer than ten organizations, although the number is expected to grow as companies begin to inspect their VMware infrastructure. Given the low infection count, it’s not clear if the attacks are targeting a specific sector at this point in time.

Mandiant also warned that the campaign’s techniques to get around traditional security controls by exploiting virtualization software represent a new attack surface that’s likely to be picked up by other hacker groups.

The attacks have been attributed to an uncategorized, emerging threat cluster codenamed UNC3886, whose motivation is likely to be espionage-driven considering the highly targeted nature of the intrusions. It further assessed with low confidence that UNC3886 has a China-nexus.

https://thehackernews.com/2022/09/new-malware-families-found-targeting.html

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
4:17 pm, Mai 11, 2025
Wetter-Symbol 24°C
L: 23° | H: 25°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 40 %
Druck: 1008 mb
Wind: 17 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 45%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:14 am
Sonnenuntergang: 8:39 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
23° | 25°°C 0.2 mm 20% 8 mph 62 % 1009 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
12° | 19°°C 1 mm 100% 9 mph 90 % 1015 mb 0 mm/h
Di. Mai 13 10:00 pm
Wetter-Symbol
13° | 22°°C 0.5 mm 50% 12 mph 87 % 1020 mb 0 mm/h
Mi. Mai 14 10:00 pm
Wetter-Symbol
10° | 22°°C 0 mm 0% 9 mph 72 % 1023 mb 0 mm/h
Do. Mai 15 10:00 pm
Wetter-Symbol
9° | 19°°C 0 mm 0% 10 mph 76 % 1027 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 23°°C 0 mm 0% 8 mph 43 % 1008 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 19°°C 0.2 mm 20% 4 mph 62 % 1009 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
14° | 14°°C 0 mm 0% 4 mph 80 % 1010 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
12° | 12°°C 0.36 mm 36% 3 mph 87 % 1010 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 0.23 mm 23% 3 mph 90 % 1011 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
18° | 18°°C 0.32 mm 32% 4 mph 72 % 1012 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 9 mph 69 % 1012 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 8 mph 64 % 1012 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,731.05
0.78%
Ethereum(ETH)
€2,217.68
2.51%
Fesseln(USDT)
€0.89
0.01%
XRP(XRP)
€2.11
-1.70%
Solana(SOL)
€153.13
0.45%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.206390
1.94%
Shiba Inu(SHIB)
€0.000014
1.03%
Pepe(PEPE)
€0.000012
3.68%
Peanut das Eichhörnchen(PNUT)
€0.392881
31.04%
Nach oben scrollen