Researchers have identified a new malware family that was designed to backdoor and create persistence on VMware ESXi servers by leveraging legitimate functionality the hypervisor software supports. According to researchers from Mandiant who found and analyzed the backdoors, they were packaged and deployed on infected servers as vSphere Installation Bundles (VIBs). VIBs are software packages used to distribute components that extend VMware ESXi functionality. The malicious VIBs provided hackers with remote command execution and persistence capabilities on the servers and the ability to execute commands on the guest virtual machines running on the servers.
- September 30, 2022
- by CDA News Team
- Cyber News
- Less than a minute
- 520 Views
Related Post
- by Francis Schmuff
- June 6, 2025
Friday Squid Blogging: Squid Run in Southern New
Southern New England is having the best squid run in years. As usual, you can also use this squid post
- by Francis Schmuff
- June 6, 2025
Hearing on the Federal Government and AI
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government
- by Francis Schmuff
- June 6, 2025
New Atomic macOS Stealer Campaign Exploits ClickFix to
Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into
- by Francis Schmuff
- June 6, 2025
Report on the Malicious Uses of AI
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our