ESXi Lockdown Mode Disabled
The disabling of Lockdown Mode on an ESXi host may indicate a threat actor attempting to weaken host security controls to enable broader remote access for data exfiltration, lateral movement, or VM tampering.
This detection identifies when Lockdown Mode is disabled on an ESXi host. Threat actors might disable this mode to weaken host security controls, allowing broader remote access via SSH or the host client. This action could be a precursor to further malicious activities such as data exfiltration, lateral movement within the environment, or tampering with virtual machines. Identifying this activity is crucial as it signifies a potential compromise of the ESXi host, which could lead to significant disruption and data loss. The detection logic is based on ESXi Syslog data.
Attack Chain
- An attacker gains initial access to the ESXi host, potentially through compromised credentials or exploiting a vulnerability.
- The attacker authenticates to the ESXi host.
- The attacker executes a command to disable Lockdown Mode. This may be done through the vSphere client or directly via SSH if enabled.
- The ESXi host logs the event of Lockdown Mode being disabled within its syslog.
- With Lockdown Mode disabled, the attacker gains broader access to the host’s management interfaces.
- The attacker performs reconnaissance activities, gathering information about the host and its virtual machines.
- The attacker moves laterally to other systems within the environment, leveraging the compromised ESXi host.
- The attacker exfiltrates sensitive data or manipulates virtual machines, achieving their final objectives.
Impact
Disabling Lockdown Mode can lead to a complete compromise of the ESXi host and the virtual machines it manages. This can result in data exfiltration, data corruption, or the deployment of ransomware on the virtual machines. Depending on the environment, this can affect hundreds or thousands of virtual machines, potentially disrupting critical business operations. The “Black Basta Ransomware” analytic story is related to this threat.
Recommendation
- Configure ESXi hosts to forward syslog output to a SIEM or log aggregation system to enable detection of this activity, as detailed in the “How to Implement” section of the source.
- Deploy the Sigma rule
ESXi Lockdown Mode Disabledto your SIEM to detect instances where Lockdown Mode is disabled on ESXi hosts. - Investigate any alerts generated by the Sigma rule
ESXi Lockdown Mode Disabledto determine the root cause and scope of the potential compromise. - Monitor ESXi syslog for messages indicating changes to host security configurations.
Detection coverage 2
ESXi Lockdown Mode Disabled
highDetects when Lockdown Mode is disabled on an ESXi host based on syslog messages.
ESXi Lockdown Mode Disabled - Network Connection
mediumDetects network connections after lockdown mode is disabled on ESXi host
Detection queries are kept inside the platform. Get full rules →