CyberSecurity updates
2025-01-31 10:43:38 Pacfic

ESXi Ransomware Attacks Utilize SSH Tunneling - 3d
ESXi Ransomware Attacks Utilize SSH Tunneling

Ransomware groups are exploiting VMware ESXi hypervisors using SSH tunneling to maintain stealthy access. Attackers are leveraging known vulnerabilities or stolen admin credentials to infiltrate ESXi instances and then use built-in SSH service for lateral movement and ransomware deployment. This allows the attackers to remain undetected while encrypting virtual environments.