Virtual machines at risk as ransomware gangs exploit dangerous VMware vulnerability
by enpar - Wednesday July 31, 2024 at 05:18 PM
#1
Virtual machines at risk as ransomware gangs exploit dangerous VMware vulnerability


VMware’s enterprise-class software for hosting virtual machines (ESXi) contains a bug that hackers are actively exploiting. They gain full administrative permissions by creating a group called “ESX Admins” and adding themselves to it.


The US Cybersecurity and Infrastructure Security Agency strongly recommends that all organizations prioritize the timely remediation of the VMware ESXi Authentication Bypass Vulnerability.

VMware ESXi is used to deploy and manage virtual machines (virtual computers). However, Microsoft discovered that this software contains an authentication bypass vulnerability.

The NIST National Vulnerability Database describes the flaw as follows: “A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group (‘ESX Admins’ by default) after it was deleted from AD.”

Security expert Kevin Beaumont explained on Mastodon that a hacker could then encrypt every VMware system, including non-Windows.

Microsoft warns that multiple ransomware operators, such as Black Basta, Storm-1175, Akira, Octo Tempest, and Manatee Tempest, utilized the technique in numerous attacks. In several cases, hackers managed to deploy ransomware.

ESXi hypervisors are favored targets for attackers because, this way, malicious actors can encrypt multiple systems at once.

“We have seen ransomware actors targeting ESXi hypervisors to facilitate mass encryption impact in few clicks, demonstrating that ransomware operators are constantly innovating their attack techniques to increase the impact on the organizations they target,” Microsoft said.

One engineering firm in North America was affected by a Black Basta this way. Hackers gained initial access to the organization via a Quakbot (information stealer) infection and then elevated their privileges using the Windows CLFS vulnerability.

A combination of Cobalt Strike and Pypykatz (a Python version of Mimikatz) was used to steal the credentials of two domain administrators and move laterally. When the threat actor created the “ESX Admins” group in the domain and added a new user account to it, it encrypted the ESXi file system.

Apparently, the VMware ESXi hypervisors consider any member of a domain group named “ESX Admins” to have full administrative access by default, without authentication or additional checks if it’s legitimate.

“This group is not a built-in group in Active Directory and does not exist by default. ESXi hypervisors do not validate that such a group exists when the server is joined to a domain and still treat any members of a group with this name with full administrative access, even if the group did not originally exist. Additionally, the membership in the group is determined by name and not by security identifier (SID),” Microsoft report reads.

VMware assigned this vulnerability a score of 6.8 out of 19, which some believe is too low.

“So you create an AD group "ESX Admins," and by default, VMware is just like ‘oh, so you're the admin now?!’ And then to make it dumber, VMware classifies this as a *moderate* severity, despite knowing ransomware TAs are actively using it? I can only conclude Broadcom is not serious about security,” security researcher Jake Williams posted.

According to CISA, Federal agencies must remediate the vulnerability within three weeks, with a due date of August 20th.

“Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable,” CISA said.

Broadcom Advisory suggests applying the available security updates. Microsoft also recommends protecting highly privileged accounts and improving the posture of critical assets.


link to original 
Reply
#2
I was using VMware and Got custom kali from a course through Udemy, It used to work fine, recently when I ran the apt upgrade and update command, My password got changed automatically plus old user pass was also changed.

I had locked the Grub bootloader still this happened. I deleted the machine, downloaded a fresh file same thing happened again. the only solution that I found was, I downloaded kali from official website and ran it on Virtual box, till now its running fine.

Thanks for the post, I thought I was doing something wrong lol.
Reply
#3
How is this only now being discovered, shouldn't this have been documented as a feature of some sort or was this just coded in and no one ever bothered to tell anyone that it exists?

Just another reason to use Qemu/KVM instead of proprietary shitware like this.
PGP: https://pastebin.com/RrGAAsQP / Infamous famous white blackhat with green socks
Reply
#4
Since Broadcom took over, VMware has turned into even more of an absolute shit-show.

Unless I'm missing something, Proxmox has always been leaps and bounds ahead of VMware; now it not only walks all over it but shits on it as well.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Ohio law to require local governments to formally approve ransomware payments lulagain 0 29 6 hours ago
Last Post: lulagain
  Royal and BlackSuit ransomware gangs hit over 450 US companies lulagain 0 83 08-08-2025, 12:52 PM
Last Post: lulagain
  Akira ransomware abuses CPU tuning tool to disable Microsoft Defender lulagain 0 93 08-07-2025, 10:17 PM
Last Post: lulagain
  New EDR killer tool used by eight different ransomware groups lulagain 0 105 08-07-2025, 10:15 PM
Last Post: lulagain
  Scattered Spider is running a VMware ESXi hacking spree lulagain 8 455 08-05-2025, 03:11 PM
Last Post: Shadowraser

Forum Jump:


 Users browsing this thread: