Saturday, December 13, 2025

Fire Ant Hackers Target VMware ESXi and vCenter Vulnerabilities to Breach Organizations

An advanced espionage campaign designated “Fire Ant” that has been targeting virtualization and networking infrastructure since early 2025.

The sophisticated threat actors demonstrated exceptional persistence and operational resilience, adapting in real-time to eradication efforts while maintaining prolonged access to compromised systems.

The campaign’s techniques and tooling show strong alignment with previous operations attributed to the Chinese-linked threat group UNC3886.

Fire Ant’s operations centered on exploiting VMware ESXi hypervisors and vCenter management servers to establish deep, persistent access within target organizations.

The attackers initially compromised vCenter servers by exploiting CVE-2023-34048, an out-of-bounds write vulnerability that enables unauthenticated remote code execution.

vMonCoreDumper.log
vMonCoreDumper.log

This critical vulnerability allowed the threat actors to gain control over the entire virtualization management layer without requiring valid credentials.

Once inside vCenter environments, the attackers extracted ‘vpxuser’ service account credentials, which provided administrative access to all connected ESXi hosts.

The group then deployed multiple persistent backdoors across the infrastructure, including malicious vSphere Installation Bundles (VIBs) that bypassed signature validation and custom Python-based backdoors that survived system reboots.

modified local.sh showing the execution of the python script ‘autobackup.bin’
modified local.sh showing the execution of the python script ‘autobackup.bin’

These tools were strategically named to blend with legitimate system processes, such as ‘ksmd’ binaries placed in system directories.

VMware ESXi and vCenter Vulnerabilities

The most concerning aspect of Fire Ant’s capabilities involved their exploitation of CVE-2023-20867, a VMware Tools vulnerability that permits unauthenticated command execution from hypervisor hosts directly into guest virtual machines.

Using PowerCLI commands routed through ‘vmtoolsd.exe’, the attackers could execute encoded PowerShell commands on guest systems without generating typical user activity logs.

Snippet from Broadcom documentation.
Snippet from Broadcom documentation.

The threat actors also demonstrated advanced credential harvesting techniques by creating memory snapshots of virtual machines and using a compiled variant of the Volatility Framework to extract sensitive data, including domain controller credentials.

showing the execution of ‘UpdateApp’ with hashdump and lsadump command-line options.
showing the execution of ‘UpdateApp’ with hashdump and lsadump command-line options.

This method left minimal forensic evidence since snapshots could be quickly created and removed.

Additionally, the group deployed tools to disable endpoint detection and response (EDR) solutions, specifically targeting SentinelOne agents while leaving other monitoring systems operational.

Network Segmentation Rendered Ineffective

According to Report, Fire Ant systematically bypassed network segmentation by compromising infrastructure components that naturally bridge network boundaries.

The attackers exploited F5 load balancers using CVE-2022-1388, deploying tunneling webshells that enabled cross-network communication.

They also leveraged IPv6 traffic to bypass IPv4-focused filtering rules, exploiting common gaps in dual-stack network configurations.

The group’s operational resilience proved particularly challenging for defenders. When eradication efforts began, Fire Ant actively monitored response activities, rotated toolsets, and re-compromised cleaned systems through redundant access paths.

In some instances, they renamed their malicious tools to impersonate legitimate forensic utilities being used by incident responders.

This campaign underscores critical blind spots in traditional security approaches, as virtualization infrastructure often lacks comprehensive monitoring and detection capabilities.

Organizations must implement enhanced logging for ESXi hosts, monitor for unauthorized VIB installations, and establish detection rules for anomalous host-to-guest command execution patterns to defend against similar advanced persistent threats.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks
Ethan Brooks
Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent News

Recent News