Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Exploit VMware ESXi Vulnerability for Ransomware Attacks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Exploit VMware ESXi Vulnerability for Ransomware Attacks

Highlights

  • Cybercriminals exploit VMware ESXi vulnerability for ransomware attacks.

  • Microsoft identifies the flaw allowing full administrative permissions.

  • The FBI lists Scattered Spider as a top cybersecurity threat.

Kaan Demirel
Last updated: 30 July, 2024 - 8:27 pm 8:27 pm
Kaan Demirel 9 months ago
Share
SHARE

Cybercriminals are leveraging a vulnerability in VMware’s ESXi hypervisor, leading to significant security concerns. Microsoft researchers revealed that the flaw allows attackers to gain full administrative permissions on domain-joined ESXi hypervisors, facilitating ransomware and extortion activities. This exploitation has raised alarms within the cybersecurity community.

Contents
VMware ESXi Vulnerability DetailsCybercriminal Operations and Ransomware Campaigns

VMware ESXi Vulnerability Details

The vulnerability, identified as CVE-2024-37085, permits attackers to add users to an attacker-created admins group, granting extensive administrative access. This technique, which some experts argue is a well-known feature rather than a bug, has been documented in VMware vSphere for over a decade. However, its abuse by cybercriminals has led to new concerns. The vulnerability impacts VMware ESXi, VMware vCenter Server, and VMware Cloud Foundation.

Experts from Microsoft and other cybersecurity entities note that the exploitation allows threat actors to encrypt the hypervisor’s file system, affecting the functionality of hosted servers. Additionally, attackers can access hosted virtual machines, exfiltrate data, and move laterally within networks. The Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerability Catalog.

Cybercriminal Operations and Ransomware Campaigns

Microsoft’s researchers highlighted that the ESXi hypervisor is a popular target for threat actors due to its prevalence in corporate environments and limited security visibility. Various cybercriminal groups, including Black Basta, Babuk, Lockbit, and Kuiper, have used ESXi encryptors in their ransomware campaigns. These incidents have notably increased in recent years, with ransomware operators like Storm-0506 exploiting the vulnerability in attacks.

Christian Mohn, a chief technologist at Proact IT Norge AS, has described the CVE as a “feature” rather than an exploit, expressing relief that VMware has decided to remove the feature due to its minimal use and potential for misconfiguration. Broadcom, VMware’s parent company, did not provide comments on the issue. Sherrod DeGrippo, Microsoft’s director of threat intelligence strategy, emphasized the importance of addressing this vulnerability to mitigate ransomware risks.

VMware ESXi has been a frequent target for cybercriminals due to its widespread adoption in corporate settings. In the past few years, numerous ransomware variants have specifically targeted ESXi hypervisors, leading to increased encryption of virtual machines. The recent rise in incidents involving ESXi encryptors underscores the need for enhanced security measures within corporate IT infrastructures.

Incidents involving groups like Octo Tempest, also known as Scattered Spider, highlight the ongoing threat posed by sophisticated cybercriminals. This group has executed high-profile attacks on major international targets, including MGM Resorts and Clorox. The FBI has recognized Scattered Spider as a significant cybersecurity threat, alongside nation-state actors from China and Russia.

Mitigating the risks associated with the CVE-2024-37085 vulnerability requires immediate patching and adherence to security best practices. Organizations must stay informed about emerging threats and ensure robust defenses against ransomware and other cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Massive Tech Outage Affects Millions Globally
Next Article Infinity Nikki Showcases Gameplay at ChinaJoy 2024

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Standard Bots Unveils Robot Arm and Expands U.S. Facility
Robotics
Samsung Offers Discounts on the Galaxy Watch Ultra Purchase
Wearables
Beat Wordle with Smart Strategies and Daily Hints
Gaming
ABB Advances AMR Technology with vSLAM for Enhanced Operations
Robotics
Tesla Semi Gains Momentum with US Foods Collaboration
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?