Current Cyber Threats

The Great VM Escape: ESXi Exploitation in the Wild

Summary:
The Huntress Tactical Response team recently detailed a sophisticated intrusion involving a VMware ESXi "virtual machine (vm) escape" toolkit, marking a significant escalation in hypervisor-targeted attacks. The incident began with a relatively common entry point, a compromised SonicWall VPN, which threat actors leveraged to move laterally and gain Domain Admin privileges. Once inside, the attackers deployed a custom toolkit designed to break out of a guest virtual machine and gain direct kernel-level execution on the ESXi host. This toolkit, which includes a driver nicknamed "MAESTRO" and a backdoor called "VSOCKpuppet," allows attackers to bypass traditional network monitoring by communicating over the VSOCK protocol, which is invisible to standard firewalls and IDS/IPS. The research suggests this toolkit may have existed as a zero-day for over a year, potentially linked to Chinese-speaking state-sponsored or high-end financial actors, and highlights a growing trend where adversaries treat hypervisors as the "crown jewels" for mass-encryption or deep-state espionage.


Security Officer Comments:
This research serves as a stark reminder that hypervisors are no longer just "infrastructure" but are now primary targets in the modern attack chain. The shift from 3% to 25% of ransomware cases involving hypervisors in late 2025 underscores that adversaries are prioritizing the "one-to-many" impact: compromising a single ESXi host provides a shortcut to encrypting or spying on every business application running on that hardware. Of particular concern is the use of the VSOCK protocol for command-and-control (C2). Because this traffic stays internal to the host-guest boundary, it circumvents the network security stack that many IT-ISAC members rely on for visibility. Organizations must recognize that a compromised Domain Admin account is now an immediate "game over" for the entire virtual environment if ESXi hosts are domain-joined without additional hardening.


Suggested Corrections:
To defend against these sophisticated VM escape techniques, organizations should implement a multi-layered defense strategy focused on both the hypervisor and the identity provider:
  • Aggressive Patching & Lifecycle Management: The analyzed toolkit exploits specific vulnerabilities (such as CVE-2025-22224/5/6) across 155 different ESXi builds. Organizations running end-of-life versions must migrate immediately, as these versions have no available fixes against modern escape logic.
  • Hardening ESXi-AD Integration: If your ESXi hosts are domain-joined, monitor for the unauthorized creation of the "ESX Admins" or "ESXi Admins" AD groups. Attackers exploit a default configuration where ESXi grants full administrative rights to anyone in these groups. Use dedicated, local ESXi accounts for management where possible to break the link between a compromised Domain Admin and the hypervisor.
  • Implement Host-Based Monitoring: Since VSOCK traffic is invisible to network firewalls, administrators should use ESXi-specific commands like lsof -a or esxcli network ip connection list to look for unusual internal sockets.
  • Restrict Management Access: Ensure that ESXi management interfaces and vCenter are isolated on out-of-band management networks. Access should be restricted to specific jump boxes and protected by mandatory Multi-Factor Authentication (MFA).
  • Driver Integrity: Monitor for "Bring Your Own Vulnerable Driver" (BYOVD) tactics by alerting on the loading of unsigned or known-vulnerable drivers (e.g., those used by the KDU utility) on Windows systems used to manage the virtual environment.

Link(s):
https://www.huntress.com/blog/esxi-vm-escape-exploit