<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ESXi — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/esxi/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/esxi/feed.xml" rel="self" type="application/rss+xml"/><item><title>ESXi VIB Acceptance Level Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</guid><description>This detection identifies changes to the VIB (vSphere Installation Bundle) acceptance level on an ESXi host, potentially allowing the installation of unsigned or unverified software and lowering the system's integrity enforcement.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting tampering with the vSphere Installation Bundle (VIB) acceptance level on ESXi hosts. Attackers may attempt to modify the VIB acceptance level, typically using the <code>esxcli software acceptance set</code> command, to bypass security controls and install malicious or unsigned software. The default acceptance levels ensure that only VMware-approved or trusted vendor-signed packages are installed, maintaining system integrity. By lowering this level, for example, to &ldquo;CommunitySupported&rdquo;, an attacker can introduce unsigned VIBs, potentially leading to persistent compromise, data exfiltration, or disruption of virtualized workloads. This activity is often observed post-compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is gained through an exploit or stolen credentials.</li>
<li>The attacker elevates privileges to execute commands with <code>shell</code> access.</li>
<li>The attacker uses the <code>esxcli software acceptance set</code> command to modify the VIB acceptance level, potentially setting it to <code>CommunitySupported</code> to allow unsigned VIBs.</li>
<li>The attacker installs a malicious VIB package onto the ESXi host.</li>
<li>The malicious VIB executes its payload, which could include installing a backdoor, modifying system configurations, or stealing data.</li>
<li>The attacker attempts to maintain persistence by hiding the malicious VIB or creating scheduled tasks.</li>
<li>The attacker leverages the compromised ESXi host to move laterally within the virtualized environment, targeting other virtual machines.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or exfiltrating sensitive data from the virtualized environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the VIB acceptance level can lead to the installation of malicious software on ESXi hosts, resulting in the compromise of virtual machines and the entire virtualized infrastructure. This can lead to data breaches, system instability, and significant operational disruption. The Black Basta ransomware group has been known to target ESXi environments, highlighting the importance of detecting this type of activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ESXi syslog forwarding to a central log management system to capture relevant events (data_source: &ldquo;VMWare ESXi Syslog&rdquo;).</li>
<li>Deploy the Sigma rule <code>ESXi VIB Acceptance Level Tampering</code> to detect changes to the VIB acceptance level (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
<li>Monitor ESXi hosts for unusual process execution and file modifications, especially related to VIB installation (rule: &ldquo;Suspicious ESXi VIB Installation&rdquo;).</li>
<li>Investigate any instances of the <code>esxcli software acceptance set</code> command being used (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vmware</category><category>esxi</category><category>vib</category><category>tampering</category><category>post-compromise</category><category>ransomware</category></item><item><title>ESXi Syslog Configuration Changes via esxcli</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-esxi-syslog-config-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-esxi-syslog-config-change/</guid><description>Detection of ESXi syslog configuration changes via esxcli command, potentially indicating an attempt to disrupt logging and evade detection.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized or malicious changes to the syslog configuration of VMware ESXi hosts. Attackers may attempt to modify syslog settings to disable or redirect logging, thereby hindering incident response and forensic analysis. The specific technique involves using the <code>esxcli</code> command-line utility, a powerful tool for managing ESXi hosts. Successful modification of the syslog configuration allows attackers to operate with reduced visibility, potentially leading to prolonged compromise and data exfiltration. This activity can be an indicator of post-compromise activity, and has been observed in association with ransomware campaigns like Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is achieved via compromised credentials or exploitation of a vulnerability.</li>
<li>The attacker authenticates to the ESXi host, potentially escalating privileges if necessary.</li>
<li>The attacker uses <code>esxcli</code> to query the current syslog configuration to understand the existing setup.</li>
<li>The attacker uses <code>esxcli</code> to modify the syslog configuration, potentially changing the remote host, protocol, or port.</li>
<li>The attacker disables or redirects syslog forwarding to a malicious or attacker-controlled server.</li>
<li>The attacker verifies the syslog configuration changes using <code>esxcli</code> or by observing the absence of logs at the original destination.</li>
<li>The attacker proceeds with other malicious activities, such as lateral movement, data exfiltration, or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of ESXi syslog configurations can severely impair an organization&rsquo;s ability to detect and respond to security incidents. This can lead to delayed detection of breaches, prolonged dwell time for attackers, and increased damage from ransomware or data theft. The consequences include significant financial losses, reputational damage, and regulatory penalties. The attack is observed being utilized post-compromise, to evade detection in ransomware campaigns like Black Basta.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ESXi syslog forwarding to a centralized logging server and monitor for configuration changes as described in the overview.</li>
<li>Deploy the provided Sigma rule <code>ESXi Syslog Config Change</code> to detect unauthorized modifications to the syslog configuration (rule ID: <code>esxi_syslog_config_change</code>).</li>
<li>Implement strict access control policies for ESXi hosts and monitor for anomalous login activity to prevent initial access.</li>
<li>Review and harden ESXi host configurations according to VMware security best practices.</li>
<li>Ensure that the Splunk Technology Add-on for VMware ESXi Logs is properly configured to parse and ingest syslog data (see How To Implement).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>syslog</category><category>vmware</category><category>defense-evasion</category><category>t1562.003</category><category>t1690</category><category>black-basta</category></item><item><title>ESXi Firewall Disabled Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-firewall-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-firewall-disabled/</guid><description>This detection identifies when the ESXi firewall is disabled or set to permissive mode, potentially exposing the host to unauthorized access and network-based attacks, often preceding lateral movement, data exfiltration, or malware installation.</description><content:encoded><![CDATA[<p>The disabling of the ESXi firewall can expose critical infrastructure to significant risk. Threat actors often disable or weaken the ESXi firewall to facilitate lateral movement within the environment, enabling them to access sensitive data or install malicious software. This detection focuses on identifying instances where the ESXi firewall has been disabled, based on syslog data. The ESXi firewall is a critical component for securing the ESXi hypervisor, which is the foundation for virtualized environments. Disabling it creates a direct path for attackers to compromise the host and any virtual machines running on it. This activity can be associated with ransomware campaigns like Black Basta, and also China-Nexus threat activity, highlighting the diverse range of adversaries who may employ this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to the network through various means, such as exploiting a vulnerability in a network service or through compromised credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access within the ESXi environment. This might involve exploiting vulnerabilities in the ESXi software or leveraging misconfigured permissions.</li>
<li><strong>Firewall Configuration Modification:</strong> Using elevated privileges, the attacker disables the ESXi firewall or sets it to a permissive mode. This can be achieved via command-line tools or the vSphere client.</li>
<li><strong>Lateral Movement:</strong> With the firewall disabled, the attacker can now move laterally within the ESXi environment, accessing other virtual machines and ESXi hosts on the network.</li>
<li><strong>Data Exfiltration:</strong> The attacker identifies and exfiltrates sensitive data from the compromised virtual machines. This data can include customer data, financial records, or intellectual property.</li>
<li><strong>Malware Installation:</strong> The attacker installs malicious software, such as ransomware, on the compromised virtual machines or ESXi hosts.</li>
<li><strong>Ransomware Deployment / System Corruption:</strong> The installed ransomware encrypts the data on the compromised systems, rendering them inaccessible until a ransom is paid. Alternatively, the attacker may corrupt critical system files, causing system instability or failure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the ESXi environment. Disabling the firewall can expose all virtual machines and ESXi hosts to unauthorized access, leading to data breaches, ransomware attacks, and significant disruption of services. Organizations that rely heavily on virtualization, such as cloud service providers and large enterprises, are particularly vulnerable. The impact could include significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Configure ESXi systems to forward syslog output to a SIEM and ensure it is ingested with the appropriate Splunk Technology Add-on for VMware ESXi Logs to enable the correlation of ESXi firewall status changes (reference: <code>esxi_syslog</code> data source).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect instances where the ESXi firewall is disabled (reference: Sigma rule).</li>
<li>Investigate any alerts generated by this rule promptly to determine the root cause and scope of the compromise (reference: Sigma rule).</li>
<li>Review and harden ESXi security configurations to minimize the risk of unauthorized access and privilege escalation (reference: description).</li>
<li>Implement multi-factor authentication for all ESXi administrative accounts to prevent credential compromise (reference: description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>firewall</category><category>lateral_movement</category><category>data_exfiltration</category><category>ransomware</category><category>attack.defense_evasion</category></item><item><title>ESXi Encryption Settings Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-encryption-modified/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-encryption-modified/</guid><description>Detection of modifications to ESXi host encryption settings, such as disabling secure boot or executable verification, which may indicate attempts to weaken hypervisor integrity and allow unauthorized code execution.</description><content:encoded><![CDATA[<p>This detection identifies unauthorized modifications to critical encryption settings on VMware ESXi hosts. Attackers may attempt to weaken hypervisor security by disabling settings such as secure boot or executable verification, allowing them to execute malicious code or compromise virtual machines. This activity is typically observed post-compromise, where the attacker has already gained privileged access to the ESXi host. The detection focuses on changes to encryption enforcement settings via ESXi syslog messages. Successfully weakening the hypervisor allows attackers to move laterally, compromise guest VMs, or establish persistent access to the environment. This is especially relevant in environments targeted by ransomware such as Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the ESXi host, potentially through exploiting a vulnerability or using compromised credentials.</li>
<li>Attacker elevates privileges to root or administrator level on the ESXi host.</li>
<li>Attacker modifies ESXi host configuration to disable secure boot using esxcli commands.</li>
<li>Attacker modifies ESXi host settings to allow execution of unsigned or unverified code, bypassing security controls.</li>
<li>Attacker deploys malicious tools or implants on the ESXi host, taking advantage of the weakened security posture.</li>
<li>Attacker uses the compromised ESXi host as a pivot point to move laterally within the virtualized environment.</li>
<li>Attacker compromises guest virtual machines, potentially deploying ransomware or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of ESXi encryption settings can lead to a significant compromise of the virtualized environment. Attackers can bypass security controls, execute unauthorized code, and potentially compromise all virtual machines hosted on the affected ESXi host. This can result in data theft, ransomware deployment, and disruption of critical services. This activity is linked to ESXi post-compromise scenarios and has been observed in connection with ransomware groups like Black Basta.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Syslog forwarding from ESXi hosts and ingest logs using the Splunk Technology Add-on for VMware ESXi Logs, as described in the &ldquo;How to Implement&rdquo; section of the source to ensure proper field extraction and CIM compatibility.</li>
<li>Deploy the Sigma rule <code>ESXi Encryption Settings Modified</code> to your SIEM and tune based on your environment to reduce false positives.</li>
<li>Investigate any alerts generated by this rule, focusing on the <code>dest</code> (destination) field to identify the affected ESXi host.</li>
<li>Use the drilldown searches provided to view detection results and risk events associated with the compromised ESXi host (<code>View the detection results for - &quot;$dest$&quot;</code>, <code>View risk events for the last 7 days for - &quot;$dest$&quot;</code>)</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>encryption</category><category>vmware</category><category>hypervisor</category><category>attack.persistence</category></item><item><title>ESXi Download Error Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-esxi-download-errors/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-esxi-download-errors/</guid><description>Detection of failed file download attempts on ESXi hosts, potentially indicating unauthorized or malicious activity such as installing or updating components, including VIBs or scripts.</description><content:encoded><![CDATA[<p>This detection focuses on identifying failed file download attempts on VMware ESXi hosts by analyzing system logs for specific error messages. The errors may stem from unauthorized or malicious attempts to install or update components, such as VIBs (vSphere Installation Bundles) or scripts, potentially leading to system compromise or disruption. This is important for defenders because successful exploitation could result in the installation of malicious software, unauthorized modifications to the ESXi host, or even complete system takeover. The detection leverages ESXi syslog data and is designed to be implemented within a Splunk environment using the appropriate technology add-on for VMware ESXi Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system with the ability to interact with the ESXi host (e.g., through compromised credentials or a vulnerability).</li>
<li>The attacker attempts to download a malicious VIB or script onto the ESXi host.</li>
<li>The ESXi host attempts to download the file from a remote location.</li>
<li>The download fails due to network issues, file integrity checks, or access restrictions.</li>
<li>The ESXi host logs an error message indicating the failed download attempt. Messages include &ldquo;<em>Download failed</em>&rdquo;, &ldquo;<em>Failed to download file</em>&rdquo;, &ldquo;<em>File download error</em>&rdquo;, &ldquo;<em>Could not download</em>&rdquo;.</li>
<li>The system logs are forwarded to a SIEM such as Splunk for analysis.</li>
<li>A detection rule identifies the error message in the logs and triggers an alert.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation following a failed download attempt could lead to the installation of malicious software, unauthorized modification of the ESXi host configuration, or denial of service. While the detection identifies <em>failed</em> download attempts, repeated failures or unusual patterns of failed downloads can indicate a persistent and potentially sophisticated attack. The impact could range from system instability to full compromise, depending on the attacker&rsquo;s objectives and the vulnerabilities exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Configure ESXi hosts to forward syslog output to your Splunk deployment to collect the necessary log data.</li>
<li>Install and configure the Splunk Technology Add-on for VMware ESXi Logs to ensure proper field extraction and CIM compatibility.</li>
<li>Deploy the provided Splunk search query to identify ESXi download errors in your environment.</li>
<li>Tune the detection logic and filter list (<code>esxi_download_errors_filter</code>) to reduce false positives based on your environment&rsquo;s specific characteristics.</li>
<li>Investigate alerts generated by the detection to determine the root cause of the failed download attempts.</li>
<li>Use the drilldown searches to view detection results and risk events associated with the identified hosts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>esxi</category><category>vmware</category><category>syslog</category><category>anomaly</category><category>T1601.001</category><category>T1685</category><category>ESXi Post Compromise</category><category>Black Basta Ransomware</category><category>Infrastructure</category><category>endpoint</category></item><item><title>ESXi Audit Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-audit-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-audit-tampering/</guid><description>Detection identifies the use of the esxcli system auditrecords commands to tamper with logging on an ESXi host, potentially evading detection and hindering forensic analysis.</description><content:encoded><![CDATA[<p>This detection identifies attempts to tamper with audit records on VMware ESXi hosts. Attackers with administrative privileges on an ESXi host can use the <code>esxcli system auditrecords</code> command to modify or delete audit logs. This can be done either remotely or locally on the host, and is indicative of an attacker attempting to cover their tracks, evade detection, and hinder subsequent forensic investigations. Successfully tampering with audit logs allows malicious actors to operate undetected within the environment, potentially leading to long-term compromise and data exfiltration. This activity is particularly relevant in cases involving ransomware, such as Black Basta, where attackers may attempt to erase evidence of their lateral movement and payload deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with privileges to access the ESXi host.</li>
<li>The attacker authenticates to the ESXi host, either locally or remotely, likely using compromised credentials.</li>
<li>The attacker executes the <code>esxcli system auditrecords</code> command.</li>
<li>The command is used with parameters to modify existing audit records, such as deleting entries or changing timestamps.</li>
<li>The attacker may target specific log entries related to their activities to erase evidence.</li>
<li>After tampering, the attacker continues their malicious activities (e.g., lateral movement, data exfiltration, or ransomware deployment) with reduced risk of detection.</li>
<li>The absence of relevant audit logs impairs incident response and forensic analysis efforts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering of ESXi audit records can severely hinder incident response and forensic analysis. Without accurate logs, security teams will struggle to determine the scope and timeline of an attack. In environments affected by ransomware like Black Basta, this can lead to delayed containment and increased data loss. The blurring of the attack timeline prevents recovery and remediation efforts. While there are no victim statistics available for this specific technique, the impact on affected organizations can be significant, resulting in financial losses, reputational damage, and regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Syslog on all ESXi hosts and forward logs to a centralized logging server to ensure logs are captured and retained even if local logs are tampered with.</li>
<li>Deploy the Sigma rule &ldquo;ESXi Audit Tampering Detection&rdquo; to your SIEM to detect the usage of <code>esxcli system auditrecords</code> command.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the source and destination of the command execution.</li>
<li>Monitor the risk score associated with the impacted systems using the <code>risk_objects</code> field in the report.</li>
<li>Review access controls and privileges assigned to ESXi hosts to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vmware</category><category>esxi</category><category>audit-tampering</category><category>defense-evasion</category></item><item><title>ESXi Loghost Configuration Tampering</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</guid><description>An attacker modifies the ESXi host's syslog configuration to disrupt log forwarding, potentially evading detection and hindering incident response.</description><content:encoded><![CDATA[<p>Attackers targeting VMware ESXi infrastructure may tamper with the syslog configuration to disable or redirect logging. This activity, often performed post-compromise, aims to hinder incident responders by preventing them from collecting crucial forensic data. This allows malicious actors to operate with less visibility, increasing the dwell time and impact of their attacks. This particular threat focuses on detecting modifications to <code>Syslog.global.logHost</code> and <code>Syslog.global.logdir</code>, key configuration parameters for syslog forwarding on ESXi hosts. The attack is detected using ESXi syslog data, typically ingested and processed using the Splunk Technology Add-on for VMware ESXi Logs. This can be part of ransomware campaigns like Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is achieved through exploitation of a vulnerability, stolen credentials, or other means.</li>
<li>The attacker escalates privileges to gain administrative access on the ESXi host.</li>
<li>The attacker modifies the ESXi syslog configuration using esxcli commands or direct manipulation of configuration files. Specifically, <code>Syslog.global.logHost</code> (the syslog server) and <code>Syslog.global.logdir</code> (the log directory) are targeted.</li>
<li>The attacker disables remote syslog forwarding by setting <code>Syslog.global.logHost</code> to an invalid or inaccessible address. Alternatively, they might redirect logs to a location they control.</li>
<li>The attacker modifies the log directory by altering the value of <code>Syslog.global.logdir</code>.</li>
<li>The attacker then proceeds with their primary objective, such as deploying ransomware or exfiltrating sensitive data, under reduced scrutiny.</li>
<li>Incident responders find difficulty in reconstructing the attack timeline due to missing or incomplete log data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with ESXi loghost configurations can significantly impair an organization&rsquo;s ability to detect and respond to security incidents. By disrupting log forwarding, attackers can effectively blind security teams, allowing them to operate undetected for extended periods. This can lead to delayed detection of ransomware deployments, data breaches, and other malicious activities, increasing the potential for financial loss, reputational damage, and operational disruption. ESXi Post Compromise can lead to Black Basta Ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect ESXi loghost configuration tampering and tune them for your environment.</li>
<li>Configure your ESXi systems to forward syslog output to a centralized logging server and ingest using the Splunk Technology Add-on for VMware ESXi Logs as specified in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the source ESXi host (<code>dest</code>) and the modified loghost configuration values.</li>
<li>Monitor ESXi host configuration changes for unexpected modifications to the syslog settings.</li>
<li>Implement strict access controls and multi-factor authentication for ESXi hosts to prevent unauthorized configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>syslog</category><category>loghost</category><category>tampering</category><category>defense-evasion</category></item><item><title>ESXi Lockdown Mode Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-lockdown-disabled/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-lockdown-disabled/</guid><description>The disabling of Lockdown Mode on an ESXi host may indicate a threat actor attempting to weaken host security controls to enable broader remote access for data exfiltration, lateral movement, or VM tampering.</description><content:encoded><![CDATA[<p>This detection identifies when Lockdown Mode is disabled on an ESXi host. Threat actors might disable this mode to weaken host security controls, allowing broader remote access via SSH or the host client. This action could be a precursor to further malicious activities such as data exfiltration, lateral movement within the environment, or tampering with virtual machines. Identifying this activity is crucial as it signifies a potential compromise of the ESXi host, which could lead to significant disruption and data loss. The detection logic is based on ESXi Syslog data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the ESXi host, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker authenticates to the ESXi host.</li>
<li>The attacker executes a command to disable Lockdown Mode. This may be done through the vSphere client or directly via SSH if enabled.</li>
<li>The ESXi host logs the event of Lockdown Mode being disabled within its syslog.</li>
<li>With Lockdown Mode disabled, the attacker gains broader access to the host&rsquo;s management interfaces.</li>
<li>The attacker performs reconnaissance activities, gathering information about the host and its virtual machines.</li>
<li>The attacker moves laterally to other systems within the environment, leveraging the compromised ESXi host.</li>
<li>The attacker exfiltrates sensitive data or manipulates virtual machines, achieving their final objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling Lockdown Mode can lead to a complete compromise of the ESXi host and the virtual machines it manages. This can result in data exfiltration, data corruption, or the deployment of ransomware on the virtual machines. Depending on the environment, this can affect hundreds or thousands of virtual machines, potentially disrupting critical business operations. The &ldquo;Black Basta Ransomware&rdquo; analytic story is related to this threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Configure ESXi hosts to forward syslog output to a SIEM or log aggregation system to enable detection of this activity, as detailed in the &ldquo;How to Implement&rdquo; section of the source.</li>
<li>Deploy the Sigma rule <code>ESXi Lockdown Mode Disabled</code> to your SIEM to detect instances where Lockdown Mode is disabled on ESXi hosts.</li>
<li>Investigate any alerts generated by the Sigma rule <code>ESXi Lockdown Mode Disabled</code> to determine the root cause and scope of the potential compromise.</li>
<li>Monitor ESXi syslog for messages indicating changes to host security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>vmware</category><category>lockdown_mode</category><category>security_controls</category></item></channel></rss>