Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

Why a modern approach is needed?

Protix: High-performance, low-level printing insect components

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Scattered spider hijacking vmware esxi deploys ransomware on critical US infrastructure
Identity

Scattered spider hijacking vmware esxi deploys ransomware on critical US infrastructure

userBy userJuly 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 28, 2025Ravi LakshmananCyber Attacks/Ransomware

Deploying ransomware to critical US infrastructure

The infamous cybercriminal group known as scattered spiders is targeting VMware ESXi hypervisors in attacks targeting North American retail, airline and transportation sectors.

“The group’s core tactics are consistent and do not rely on software exploits. Instead, we use proven playbooks centered around calling the IT help desk,” Google’s Mandiant team said in an extensive analysis.

“The actors are offensive and creative, and are particularly skilled at bypassing mature security programs using social engineering. The attacks are not opportunistic, but they are precise, campaign-driven operations targeting the organization’s most important systems and data.”

Also known as 0ktapus, Muddled Libra, Oct Tempest, and UNC3944, threat actors adopt a “LOTL) approach by implementing sophisticated social engineering attacks to gain initial access to the victim environment, operate trusted management systems, and leverage Active Directory controls to the VMWare environment.

Cybersecurity

Google said the method, which provides a pathway for data removal and ransomware deployment directly from the hypervisor, is “very effective” as it bypasses security tools and leaves almost a trace of compromise.

The attack chain unfolds in five different phases –

Early compromises, reconnaissance, and privilege escalation allow threat actors to gather information related to IT documents, support guides, organizational charts, and VSphere administrators, and enumerate credentials from password managers such as Hashicorp Vault and other Privileged Access Management (PAM) solutions. The attacker has been found to make additional calls to the company’s IT help desk, impersonating a valuable administrator, and requesting a password reset to gain control of the account. Pivot into the virtual environment using the mapped Active Directory for VSphere credentials and gain access to the VMware vCenter Server Appliance (VCSA). A teleport is then performed to allow SSH connections on the ESXI host and create a permanent, encrypted reverse shell to enable SSH connections to run resitting root if they are not hiding using a password. ntds.dit Active Directory database. This attack works by powering up a Domain Controller (DC) virtual machine (VM) and removing the virtual disk. After copying the NTDS.DIT file, the entire process reverses and the DC powers up. Weaponize access to delete backup jobs, snapshots, and repository, use SSH access to ESXI hosts to block recovery and push custom ransomware binaries via SCP/SFTP

“The UNC3944 Playbook requires a fundamental change in defensive strategies that move from EDR-based threat hunting to a move from a proactive, infrastructure-centric defense,” Google said. “This threat differs from traditional Windows ransomware in two ways: speed and stealth.”

The technology giant called for “extreme speed” for threat actors, saying that data stripping from initial access and the entire infection sequence from the final ransomware deployment could occur within hours.

According to Palo Alto Networks Unit 42, the scattered spider actors are not only proficient in social engineering, but are also partnering with the Dragonforce (aka Slippery Scorpius) ransomware program, excluding more than 100 GB of data over two days.

To combat such threats, organizations recommend following three layers of protection –

It enables vSphere lockdown mode, enforces deciNStalledonly, implements VSphere VM encryption, obsolete VMs, phishing-resistant multifactor authentication (MFA) that hardens your help desk, and implements isolated, critical identity infrastructure.

Cybersecurity

Google is also urging organizations to reorganize their systems with security in mind when migrating from VMware VSphere 7 to approach end of life (EOL) in October 2025.

“Ransomware targeting VSphere infrastructure, including both ESXI hosts and vCenter servers, poses its own serious risks due to the ability to paralyze the infrastructure instantly and broadly,” Google said.

“Unable to actively address these interconnected risks by implementing these recommended mitigations will expose organizations to target attacks that could quickly cripple the entire virtualized infrastructure, leading to operational disruption and financial losses.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCISO Guide to SaaS AI Governance
Next Article MicroCarb Satellite Launch Transforms CO2 Monitoring
user
  • Website

Related Posts

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

July 28, 2025

Why a modern approach is needed?

July 28, 2025

CISO Guide to SaaS AI Governance

July 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

Why a modern approach is needed?

Protix: High-performance, low-level printing insect components

Los Alamos researchers unlock quantum machine learning

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.