ESXi Audit Tampering Detection
Detection identifies the use of the esxcli system auditrecords commands to tamper with logging on an ESXi host, potentially evading detection and hindering forensic analysis.
This detection identifies attempts to tamper with audit records on VMware ESXi hosts. Attackers with administrative privileges on an ESXi host can use the esxcli system auditrecords command to modify or delete audit logs. This can be done either remotely or locally on the host, and is indicative of an attacker attempting to cover their tracks, evade detection, and hinder subsequent forensic investigations. Successfully tampering with audit logs allows malicious actors to operate undetected within the environment, potentially leading to long-term compromise and data exfiltration. This activity is particularly relevant in cases involving ransomware, such as Black Basta, where attackers may attempt to erase evidence of their lateral movement and payload deployment.
Attack Chain
- An attacker gains initial access to a system with privileges to access the ESXi host.
- The attacker authenticates to the ESXi host, either locally or remotely, likely using compromised credentials.
- The attacker executes the
esxcli system auditrecordscommand. - The command is used with parameters to modify existing audit records, such as deleting entries or changing timestamps.
- The attacker may target specific log entries related to their activities to erase evidence.
- After tampering, the attacker continues their malicious activities (e.g., lateral movement, data exfiltration, or ransomware deployment) with reduced risk of detection.
- The absence of relevant audit logs impairs incident response and forensic analysis efforts.
Impact
Successful tampering of ESXi audit records can severely hinder incident response and forensic analysis. Without accurate logs, security teams will struggle to determine the scope and timeline of an attack. In environments affected by ransomware like Black Basta, this can lead to delayed containment and increased data loss. The blurring of the attack timeline prevents recovery and remediation efforts. While there are no victim statistics available for this specific technique, the impact on affected organizations can be significant, resulting in financial losses, reputational damage, and regulatory fines.
Recommendation
- Enable Syslog on all ESXi hosts and forward logs to a centralized logging server to ensure logs are captured and retained even if local logs are tampered with.
- Deploy the Sigma rule “ESXi Audit Tampering Detection” to your SIEM to detect the usage of
esxcli system auditrecordscommand. - Investigate any alerts triggered by the Sigma rule, focusing on the source and destination of the command execution.
- Monitor the risk score associated with the impacted systems using the
risk_objectsfield in the report. - Review access controls and privileges assigned to ESXi hosts to minimize the attack surface.
Detection coverage 2
ESXi Audit Tampering Detection
highDetects the use of esxcli system auditrecords command to tamper with logging on an ESXi host.
ESXi Audit Records Access via Shell
mediumDetects the use of esxcli system auditrecords command through a shell session.
Detection queries are kept inside the platform. Get full rules →