Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit

Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit

Posted on January 8, 2026January 8, 2026 By CWS

Hackers are exploiting VMware ESXi situations within the wild with a zero-day exploit toolkit that chains a number of vulnerabilities for VM escapes. Cybersecurity agency Huntress disrupted one such assault, attributing preliminary entry to a compromised SonicWall VPN.​

Menace actors gained a foothold through SonicWall VPN, then used a compromised Area Admin account for lateral motion to backup and first area controllers.

On the first DC, they deployed reconnaissance instruments like Superior Port Scanner and ShareFinder, staged information with WinRAR, and altered Home windows firewall guidelines to dam exterior outbound site visitors whereas permitting inner lateral motion.

Roughly 20 minutes after toolkit deployment, they executed the ESXi exploit, which Huntress stopped earlier than ransomware deployment.​

VMware ESXi Situations Exploit Toolkit

The toolkit, dubbed MAESTRO by Huntress, orchestrates disabling VMware VMCI drivers with devcon.exe, loading an unsigned driver through KDU to bypass Driver Signature Enforcement, and executing the core escape.

Toolkit (Supply: Huntress)

MyDriver.sys queries the ESXi model through VMware Visitor SDK, selects offsets from a desk supporting 155 builds throughout ESXi 5.1 to eight.0, leaks VMX base through HGFS (CVE-2025-22226), corrupts reminiscence through VMCI (CVE-2025-22224), and deploys shellcode for sandbox escape (CVE-2025-22225).​

CVE IDCVSS ScoreDescriptionCVE-2025-222267.1Out-of-bounds learn in HGFS leaking VMX reminiscence​CVE-2025-222249.3Arbitrary write escaping the VMX sandbox to kernel​CVE-2025-222258.2Arbitrary write escaping the VMX sandbox to the kernel​

Shellcode phases deploy VSOCKpuppet, a backdoor hijacking ESXi’s inetd on port 21 for root execution, utilizing VSOCK for stealthy guest-host communication invisible to community instruments.​

PDB paths reveal growth in simplified Chinese language environments, like “全版本逃逸–交付” (All model escape-delivery), dated February 2024, over a 12 months earlier than Broadcom’s VMSA-2025-0004 disclosure on March 4, 2025.

A shopper.exe PDB from November 2023 suggests modular tooling, with tampered VMware drivers referencing “XLab”. Huntress has excessive confidence in Chinese language-speaking origins attributable to sources and zero-day entry.​

VM isolation fails in opposition to hypervisor flaws; patch ESXi urgently, as end-of-life variations lack fixes. Monitor ESXi hosts with “lsof -a” for VSOCK processes, look ahead to BYOD loaders like KDU, and safe VPNs. Firewall tweaks and unsigned drivers sign compromise; VSOCK backdoors evade IDS.​

This incident underscores persistent hypervisor threats, with attackers prioritizing stealth through driver restoration and config cleanup post-exploitation. Organizations should harden virtualization aggressively amid rising ransomware concentrating on ESXi.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ESXi, Exploit, Exploiting, Hackers, Instances, Toolkit, VMware, Wild, ZeroDay

Post navigation

Previous Post: Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
Next Post: CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Related Posts

Apache Tomcat Security Flaw Allows Constraint Bypass Apache Tomcat Security Flaw Allows Constraint Bypass Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation Cyber Security News
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks Cyber Security News
Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Critical Android System Component Vulnerability Let Attackers Execute Remote Code without User Interaction Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Angular SSR Flaw Exposes Unauthorized Requests
  • North Korean Hackers Exploit npm Packages for Malware
  • US Military’s Controversial Use of Claude AI in Iran Strike
  • Browser Extension Misuse Reveals Security Risks
  • Cyber Attack via Prayer App Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Angular SSR Flaw Exposes Unauthorized Requests
  • North Korean Hackers Exploit npm Packages for Malware
  • US Military’s Controversial Use of Claude AI in Iran Strike
  • Browser Extension Misuse Reveals Security Risks
  • Cyber Attack via Prayer App Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News