Security News > 2022 > December > New Python malware backdoors VMware ESXi servers for remote access

A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.
VMware ESXi is a virtualization platform commonly used in the enterprise to host numerous servers on one device while using CPU and memory resources more effectively.
The new backdoor was discovered by Juniper Networks researchers, who found the backdoor on a VMware ESXi server.
The script's name and location make Juniper Networks believe that the malware operators intend to target VMware ESXi servers specifically.
"The file begins with a VMware copyright consistent with publicly available examples and is taken character-for-character from an existing Python file provided by VMware."
One of the threat actors' actions observed by Juniper's analysts was to change the ESXi reverse HTTP proxy configuration to allow remote access to communicate with the planted webserver.
News URL
Related news
- Over 37,000 VMware ESXi servers vulnerable to ongoing attacks (source)
- New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking (source)
- Recent Windows Server 2025 updates cause Remote Desktop freezes (source)
- Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers (source)
- OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers (source)
- Police detains Smokeloader malware customers, seizes servers (source)
- Crypto Developers Targeted by Python Malware Disguised as Coding Challenges (source)
- Oh, cool. Microsoft melts bug that froze Server 2025 Remote Desktop sessions (source)