Cyberespionage Group Exploits Zero-Day Vulnerability in VMware ESXi
Chinese cyberespionage group UNC3886 has been caught exploiting a zero-day vulnerability in VMware ESXi for privilege escalation purposes, according to the cybersecurity firm, Mandiant. The group has been installing backdoors on ESXi hypervisors to gain command execution, reverse shell capabilities, and file manipulation. Using malicious vSphere Installation Bundles (VIBs), which are packages for deploying updates, the attackers have been harvesting credentials from vCenter Servers for all connected ESXi hosts, modifying and disabling logging services, and deploying backdoors. Moreover, the group has been exploiting CVE-2023-20867 – a low severity vulnerability in VMware Tools restricting guest-to-host operations authentication – to execute privileged commands across Windows, Linux, and PhotonOS guest VMs. The group’s recent activities involve deploying backdoors using VMCI sockets, exploiting the zero-day vulnerability in VMware Tools, and executing a large number of unauthenticated actions with the highest privileged accounts across guest VMs.
The Impact of UNC3886’s Malicious Actions
The exploitation of this zero-day vulnerability, although ‘low severity,’ allows for UNC3886 to escalate privileges to a fully compromised ESXi host, resulting in the compromised guest virtual machine’s confidentiality and integrity. Furthermore, the bug requires root access to the ESXi server for exploitation. UNC3886’s malicious actions have also impacted vCenter servers and Windows virtual machines. As Mandiant reports, UNC3886 is known for targeting defense, technology, and telecommunication organizations in the US and the Asia-Pacific region for its cyberespionage activities. The group is usually seen exploiting zero-day bugs in firewall and virtualization solutions.
Mitigating Strategies
Organizations using VMware ESXi are advised to update their system to version 12.2.5 – the patched version for CVE-2023-20867. It is also recommended to restrict ESXi host management traffic and prioritize patching. Securing credentials is imperative to prevent unauthorized accesses and the loss of sensitive data. Another mitigation plan is to monitor any attempts at modifying or disabling the logging services on the systems.
Conclusion
The exploitation of this zero-day vulnerability by UNC3886 underscores the significance of cybersecurity awareness for businesses. This includes monitoring the security infrastructure of virtualization solutions, applying regular security updates, and preventing unauthorized access to sensitive data. Organizations specializing in defense, tech, and telecommunications are advised to prioritize security measures to protect themselves from future zero-day attacks.
Moreover, the incident raises the philosophical question of how much is cybersecurity important to the economy, social welfare, and national security. As cyberattacks are on the rise globally, businesses and governments should prioritize cybersecurity initiatives and develop skills to maintain safe cyberspace platforms. Failure to do so could lead to damaging consequences for economies, social welfare, and, above all, national security.
<< photo by cottonbro studio >>
You might want to read !
- “Navigating the Intersection: Advice for Security Leaders Partnering with Cybersecurity Startups”
- “After a Decade of Elusive Pursuit, Gozi Malware’s IT Mastermind Finally Sentenced to Jail”
- Why the CosmicEnergy ICS Malware is not an Immediate Threat and why it Should Not be Ignored
- US and Guam’s critical infrastructure under attack by Chinese-linked hackers
- “Fortinet’s Response: Fixing the Critical FortiGate SSL VPN Vulnerability”
- Revamping Your Security Operations Center Strategy: 5 Modernization Tips
- Easily Exploitable Spoofing Bug in Visual Studio Raises Alarm among Researchers
- “Cisco Fixes Major Security Vulnerabilities in Collaboration Software”
- The Emergence of a New Cyber Threat: Go-Based Info Stealer Offered by Cyclops Ransomware Gang
- Exploring the Potential of CrowdStrike’s AI Assistant: Charlotte
- Transforming Cybersecurity Strategy: Eliminating Silos and Strengthening Defenses
- Is Your Fortinet Security System at Risk? Recent Warnings of Potential Zero-Day Exploits in Limited Attacks
- “Barracuda’s Blind Spot: A Zero-Day Exploit That Went Undetected for Months”
- The Latest Cyber Threat: Zero-Day Exploit Targets Barracuda Email Security Gateway Appliances