Security News > 2022 > December > New Python malware backdoors VMware ESXi servers for remote access
A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.
VMware ESXi is a virtualization platform commonly used in the enterprise to host numerous servers on one device while using CPU and memory resources more effectively.
The new backdoor was discovered by Juniper Networks researchers, who found the backdoor on a VMware ESXi server.
The script's name and location make Juniper Networks believe that the malware operators intend to target VMware ESXi servers specifically.
"The file begins with a VMware copyright consistent with publicly available examples and is taken character-for-character from an existing Python file provided by VMware."
One of the threat actors' actions observed by Juniper's analysts was to change the ESXi reverse HTTP proxy configuration to allow remote access to communicate with the planted webserver.
News URL
Related news
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- Salt Typhoon hackers backdoor telcos with new GhostSpider malware (source)
- Hackers exploit ProjectSend flaw to backdoor exposed servers (source)
- Chinese hackers use Visual Studio Code tunnels for remote access (source)
- Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service (source)
- Remote Access Checklist (source)
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356) (source)
- Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools (source)