Security News > 2022 > December > New Python malware backdoors VMware ESXi servers for remote access

A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.
VMware ESXi is a virtualization platform commonly used in the enterprise to host numerous servers on one device while using CPU and memory resources more effectively.
The new backdoor was discovered by Juniper Networks researchers, who found the backdoor on a VMware ESXi server.
The script's name and location make Juniper Networks believe that the malware operators intend to target VMware ESXi servers specifically.
"The file begins with a VMware copyright consistent with publicly available examples and is taken character-for-character from an existing Python file provided by VMware."
One of the threat actors' actions observed by Juniper's analysts was to change the ESXi reverse HTTP proxy configuration to allow remote access to communicate with the planted webserver.
News URL
Related news
- QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features (source)
- Rsync vulnerabilities allow remote code execution on servers, patch quickly! (source)
- Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws (source)
- Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation (source)
- Ransomware gang uses SSH tunnels for stealthy VMware ESXi access (source)
- Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access (source)
- Kimsuky hackers use new custom RDP Wrapper for remote access (source)
- DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects (source)