Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit

Posted on January 8, 2026January 8, 2026 By CWS

Hackers are exploiting VMware ESXi situations within the wild with a zero-day exploit toolkit that chains a number of vulnerabilities for VM escapes. Cybersecurity agency Huntress disrupted one such assault, attributing preliminary entry to a compromised SonicWall VPN.​

Menace actors gained a foothold through SonicWall VPN, then used a compromised Area Admin account for lateral motion to backup and first area controllers.

On the first DC, they deployed reconnaissance instruments like Superior Port Scanner and ShareFinder, staged information with WinRAR, and altered Home windows firewall guidelines to dam exterior outbound site visitors whereas permitting inner lateral motion.

Roughly 20 minutes after toolkit deployment, they executed the ESXi exploit, which Huntress stopped earlier than ransomware deployment.​

VMware ESXi Situations Exploit Toolkit

The toolkit, dubbed MAESTRO by Huntress, orchestrates disabling VMware VMCI drivers with devcon.exe, loading an unsigned driver through KDU to bypass Driver Signature Enforcement, and executing the core escape.

Toolkit (Supply: Huntress)

MyDriver.sys queries the ESXi model through VMware Visitor SDK, selects offsets from a desk supporting 155 builds throughout ESXi 5.1 to eight.0, leaks VMX base through HGFS (CVE-2025-22226), corrupts reminiscence through VMCI (CVE-2025-22224), and deploys shellcode for sandbox escape (CVE-2025-22225).​

CVE IDCVSS ScoreDescriptionCVE-2025-222267.1Out-of-bounds learn in HGFS leaking VMX reminiscence​CVE-2025-222249.3Arbitrary write escaping the VMX sandbox to kernel​CVE-2025-222258.2Arbitrary write escaping the VMX sandbox to the kernel​

Shellcode phases deploy VSOCKpuppet, a backdoor hijacking ESXi’s inetd on port 21 for root execution, utilizing VSOCK for stealthy guest-host communication invisible to community instruments.​

PDB paths reveal growth in simplified Chinese language environments, like “全版本逃逸–交付” (All model escape-delivery), dated February 2024, over a 12 months earlier than Broadcom’s VMSA-2025-0004 disclosure on March 4, 2025.

A shopper.exe PDB from November 2023 suggests modular tooling, with tampered VMware drivers referencing “XLab”. Huntress has excessive confidence in Chinese language-speaking origins attributable to sources and zero-day entry.​

VM isolation fails in opposition to hypervisor flaws; patch ESXi urgently, as end-of-life variations lack fixes. Monitor ESXi hosts with “lsof -a” for VSOCK processes, look ahead to BYOD loaders like KDU, and safe VPNs. Firewall tweaks and unsigned drivers sign compromise; VSOCK backdoors evade IDS.​

This incident underscores persistent hypervisor threats, with attackers prioritizing stealth through driver restoration and config cleanup post-exploitation. Organizations should harden virtualization aggressively amid rising ransomware concentrating on ESXi.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ESXi, Exploit, Exploiting, Hackers, Instances, Toolkit, VMware, Wild, ZeroDay

Post navigation

Previous Post: Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
Next Post: CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Related Posts

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver Cyber Security News
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News
ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger Cyber Security News
Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks Cyber Security News
Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • What tools help reduce fraud or friendly fraud for online businesses? 
  • WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
  • UK Government Unveils New Cyber Action Plan
  • UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia
  • ChatGPT Health – A Dedicated Space for Health Queries With Strong Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • What tools help reduce fraud or friendly fraud for online businesses? 
  • WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messaging
  • UK Government Unveils New Cyber Action Plan
  • UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia
  • ChatGPT Health – A Dedicated Space for Health Queries With Strong Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark