Uncategorized

Fire Ant Hackers Target VMware ESXi and vCenter Vulnerabilities to Breach Organizations

An advanced espionage campaign designated “Fire Ant” that has been targeting virtualization and networking infrastructure since early 2025.

The sophisticated threat actors demonstrated exceptional persistence and operational resilience, adapting in real-time to eradication efforts while maintaining prolonged access to compromised systems.

The campaign’s techniques and tooling show strong alignment with previous operations attributed to the Chinese-linked threat group UNC3886.

Fire Ant’s operations centered on exploiting VMware ESXi hypervisors and vCenter management servers to establish deep, persistent access within target organizations.

The attackers initially compromised vCenter servers by exploiting CVE-2023-34048, an out-of-bounds write vulnerability that enables unauthenticated remote code execution.

vMonCoreDumper.log

This critical vulnerability allowed the threat actors to gain control over the entire virtualization management layer without requiring valid credentials.

Once inside vCenter environments, the attackers extracted ‘vpxuser’ service account credentials, which provided administrative access to all connected ESXi hosts.

The group then deployed multiple persistent backdoors across the infrastructure, including malicious vSphere Installation Bundles (VIBs) that bypassed signature validation and custom Python-based backdoors that survived system reboots.

modified local.sh showing the execution of the python script ‘autobackup.bin’

These tools were strategically named to blend with legitimate system processes, such as ‘ksmd’ binaries placed in system directories.

VMware ESXi and vCenter Vulnerabilities

The most concerning aspect of Fire Ant’s capabilities involved their exploitation of CVE-2023-20867, a VMware Tools vulnerability that permits unauthenticated command execution from hypervisor hosts directly into guest virtual machines.

Using PowerCLI commands routed through ‘vmtoolsd.exe’, the attackers could execute encoded PowerShell commands on guest systems without generating typical user activity logs.

Snippet from Broadcom documentation.

The threat actors also demonstrated advanced credential harvesting techniques by creating memory snapshots of virtual machines and using a compiled variant of the Volatility Framework to extract sensitive data, including domain controller credentials.

showing the execution of ‘UpdateApp’ with hashdump and lsadump command-line options.

This method left minimal forensic evidence since snapshots could be quickly created and removed.

Additionally, the group deployed tools to disable endpoint detection and response (EDR) solutions, specifically targeting SentinelOne agents while leaving other monitoring systems operational.

Network Segmentation Rendered Ineffective

According to Report, Fire Ant systematically bypassed network segmentation by compromising infrastructure components that naturally bridge network boundaries.

The attackers exploited F5 load balancers using CVE-2022-1388, deploying tunneling webshells that enabled cross-network communication.

They also leveraged IPv6 traffic to bypass IPv4-focused filtering rules, exploiting common gaps in dual-stack network configurations.

The group’s operational resilience proved particularly challenging for defenders. When eradication efforts began, Fire Ant actively monitored response activities, rotated toolsets, and re-compromised cleaned systems through redundant access paths.

In some instances, they renamed their malicious tools to impersonate legitimate forensic utilities being used by incident responders.

This campaign underscores critical blind spots in traditional security approaches, as virtualization infrastructure often lacks comprehensive monitoring and detection capabilities.

Organizations must implement enhanced logging for ESXi hosts, monitor for unauthorized VIB installations, and establish detection rules for anomalous host-to-guest command execution patterns to defend against similar advanced persistent threats.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago