<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Post-Compromise — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/post-compromise/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/post-compromise/feed.xml" rel="self" type="application/rss+xml"/><item><title>ESXi VIB Acceptance Level Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</guid><description>This detection identifies changes to the VIB (vSphere Installation Bundle) acceptance level on an ESXi host, potentially allowing the installation of unsigned or unverified software and lowering the system's integrity enforcement.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting tampering with the vSphere Installation Bundle (VIB) acceptance level on ESXi hosts. Attackers may attempt to modify the VIB acceptance level, typically using the <code>esxcli software acceptance set</code> command, to bypass security controls and install malicious or unsigned software. The default acceptance levels ensure that only VMware-approved or trusted vendor-signed packages are installed, maintaining system integrity. By lowering this level, for example, to &ldquo;CommunitySupported&rdquo;, an attacker can introduce unsigned VIBs, potentially leading to persistent compromise, data exfiltration, or disruption of virtualized workloads. This activity is often observed post-compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is gained through an exploit or stolen credentials.</li>
<li>The attacker elevates privileges to execute commands with <code>shell</code> access.</li>
<li>The attacker uses the <code>esxcli software acceptance set</code> command to modify the VIB acceptance level, potentially setting it to <code>CommunitySupported</code> to allow unsigned VIBs.</li>
<li>The attacker installs a malicious VIB package onto the ESXi host.</li>
<li>The malicious VIB executes its payload, which could include installing a backdoor, modifying system configurations, or stealing data.</li>
<li>The attacker attempts to maintain persistence by hiding the malicious VIB or creating scheduled tasks.</li>
<li>The attacker leverages the compromised ESXi host to move laterally within the virtualized environment, targeting other virtual machines.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or exfiltrating sensitive data from the virtualized environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the VIB acceptance level can lead to the installation of malicious software on ESXi hosts, resulting in the compromise of virtual machines and the entire virtualized infrastructure. This can lead to data breaches, system instability, and significant operational disruption. The Black Basta ransomware group has been known to target ESXi environments, highlighting the importance of detecting this type of activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ESXi syslog forwarding to a central log management system to capture relevant events (data_source: &ldquo;VMWare ESXi Syslog&rdquo;).</li>
<li>Deploy the Sigma rule <code>ESXi VIB Acceptance Level Tampering</code> to detect changes to the VIB acceptance level (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
<li>Monitor ESXi hosts for unusual process execution and file modifications, especially related to VIB installation (rule: &ldquo;Suspicious ESXi VIB Installation&rdquo;).</li>
<li>Investigate any instances of the <code>esxcli software acceptance set</code> command being used (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vmware</category><category>esxi</category><category>vib</category><category>tampering</category><category>post-compromise</category><category>ransomware</category></item></channel></rss>