Unnoticed python backdoor designed to target ESXi server
Juniper Threat Lab has discovered two active vulnerabilities being exploited in the wild. CVE-2019-5544 and CVE-2020-3992, both vulnerabilities belonging to ESXI's OpenSLP service, have been used since 2019 to implant backdoors in VMware ESXi virtualization servers.
VMware ESXi is an enterprise-class hypervisor developed by VMware. This is a bare metal hypervisor. That is, it runs directly on your system hardware without the need for an operating system. You can run multiple virtual machines on a single physical hardware.
While investigating a compromised host, JTL uncovered a simple but powerful backdoor Python script, but with limited log storage on the server, JTL Labs had no idea how the server was compromised. It is unknown whether
"Although the Python scripts used in this attack are cross-platform and can be used on Linux or other UNIX-like systems with little or no modification, there are some indications that this attack was designed specifically for ESXi. I have. The file name and location /store/packages/vmtools.py were chosen to give little suspicion to the virtualization host. This file begins with a VMware copyright that matches a publicly available sample and is extracted letter by letter from an existing Python file provided by VMware." JTL posted.
Subscribe to:
Post Comments (Atom)
Google Uncovers LOSTKEYS Malware Tied to Russian Hackers
Google Uncovers 'LOSTKEYS' Malware Linked to Russian Hacking Group Cold River May 7, 2025 — Alphabet’s Google has disclosed the ...
-
DigiCert's Revocation of 83,000 Certificates: A Critical Security Move DigiCert has begun the process of revoking over 83,000 SSL/TLS ...
-
SuperBlack Ransomware Exploits Fortinet Vulnerabilities: A New Cyber Threat Emerges A Russian-linked threat actor, identified as Mora_001,...
-
Critical Ingress NGINX Controller Vulnerabilities Expose Kubernetes Clusters to Remote Code Execution A set of five critical security vuln...
No comments:
Post a Comment