Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeMalware & ThreatsRansomware Attacks ESXi Systems through Covert SSH Tunnels for Command and Control...

Ransomware Attacks ESXi Systems through Covert SSH Tunnels for Command and Control Purposes

Published on

spot_img

Cybersecurity researchers have uncovered a new trend in ransomware attacks targeting ESXi systems. These attacks are now being used as a gateway to tunnel traffic to command-and-control (C2) infrastructure, allowing threat actors to operate stealthily within corporate networks. The researchers at Sygnia recently published a report highlighting this worrying development.

According to the researchers, threat actors are exploiting unmonitored ESXi appliances as a means of establishing persistence and gaining access to corporate networks. By using native tools like SSH to create a SOCKS tunnel between their C2 servers and the compromised environment, the attackers are able to blend in with legitimate network traffic, making it difficult for security controls to detect their activities.

In many incident response engagements, Sygnia found that ESXi systems were compromised either through the use of stolen admin credentials or by exploiting known security vulnerabilities. Once access is gained, threat actors set up tunnels using SSH or similar tools to create a semi-persistent backdoor within the network, ensuring long-term access without raising suspicion.

Monitoring ESXi logs is crucial in detecting and responding to these attacks. Sygnia recommends configuring log forwarding to capture relevant events in one centralized location for forensic analysis. Specifically, organizations should review log files such as /var/log/shell.log, /var/log/hostd.log, /var/log/auth.log, and /var/log/vobd.log to identify suspicious activities related to SSH tunneling on ESXi appliances.

In a separate development, the Andariel group, linked to North Korea, has been observed using a technique known as Relative Identifier (RID) hijacking to achieve persistence in Windows environments. This method involves covertly modifying the Windows Registry to assign guest or low-privileged accounts administrative permissions during the next login. By exploiting this vulnerability, threat actors can perform malicious actions without detection, leveraging the lack of surveillance on regular user accounts.

To execute RID hijacking successfully, adversaries must have already compromised a machine and gained administrative or SYSTEM privileges. This enables them to change the RID value of a standard account to that of the Administrator account, granting elevated privileges without triggering alerts.

Meanwhile, researchers have identified a new technique for evading Endpoint Detection and Response (EDR) systems by leveraging hardware breakpoints. By using the NtContinue function instead of SetThreadContext, attackers can avoid triggering Event Tracing for Windows (ETW) detections, effectively bypassing EDR telemetry that relies on SetThreadContext for monitoring suspicious activities. This approach enables threat actors to manipulate telemetry in userland without direct kernel patching, posing a challenge to traditional defense mechanisms.

Overall, these developments underscore the evolving tactics of cybercriminals and the need for organizations to enhance their cybersecurity measures to effectively detect and respond to advanced threats. By staying vigilant and adopting proactive security measures, businesses can mitigate the risks posed by ransomware, RID hijacking, and EDR evasion techniques.

Source link

Latest articles

Top 5 threats keeping CISOs awake at night in 2025

In 2025, the landscape of cyber threats has evolved, requiring CISOs to take a...

New Cyber Attack Targets PyPI Users for Stealing Cloud Tokens and Sensitive Data

A recent discovery made by researchers at ReversingLabs has brought to light a malicious...

Breaking: Aptori’s AI-powered platform lowers risk, ensures compliance — now available on Google Marketplace

Aptori, a pioneer in AI-driven application security, has recently unveiled its AI-driven AppSec Platform...

Sola Security Introduces AI-Powered SOAR Solution with $30M Funding Boost

Tel Aviv-based cybersecurity startup Sola Security recently secured $30 million in funding to develop...

More like this

Top 5 threats keeping CISOs awake at night in 2025

In 2025, the landscape of cyber threats has evolved, requiring CISOs to take a...

New Cyber Attack Targets PyPI Users for Stealing Cloud Tokens and Sensitive Data

A recent discovery made by researchers at ReversingLabs has brought to light a malicious...

Breaking: Aptori’s AI-powered platform lowers risk, ensures compliance — now available on Google Marketplace

Aptori, a pioneer in AI-driven application security, has recently unveiled its AI-driven AppSec Platform...