By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Tech News

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

By Viral Trending Content 5 Min Read
Share
SHARE

Jul 28, 2025Ravie LakshmananCyber Attack / Ransomware

Deploy Ransomware on Critical U.S. Infrastructure

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America.

“The group’s core tactics have remained consistent and do not rely on software exploits. Instead, they use a proven playbook centered on phone calls to an IT help desk,” Google’s Mandiant team said in an extensive analysis.

“The actors are aggressive, creative, and particularly skilled at using social engineering to bypass even mature security programs. Their attacks are not opportunistic but are precise, campaign-driven operations aimed at an organization’s most critical systems and data.”

Also called 0ktapus, Muddled Libra, Octo Tempest, and UNC3944, the threat actors have a history of conducting advanced social engineering attacks to obtain initial access to victim environments and then adopting a “living-off-the-land” (LotL) approach by manipulating trusted administrative systems and leveraging their control of Active Directory to pivot to the VMware vSphere environment.

Cybersecurity

Google said the method, which provides a pathway for data exfiltration and ransomware deployment directly from the hypervisor, is “highly effective,” as it bypasses security tools and leaves few traces of compromise.

The attack chain unfolds over five distinct phases –

  • Initial compromise, reconnaissance, and privilege escalation, allowing the threat actors to harvest information related to IT documentation, support guides, organization charts, and vSphere administrators, as well as enumerate credentials from password managers like HashiCorp Vault or other Privileged Access Management (PAM) solutions. The attackers have been found to make additional calls to the company’s IT help desk to impersonate a high-value administrator and request a password reset to gain control of the account.
  • Pivoting to the virtual environment using the mapped Active Directory to vSphere credentials and gaining access to VMware vCenter Server Appliance (vCSA), after which teleport is executed to create a persistent and encrypted reverse shell that bypasses firewall rules
  • Enabling SSH connections on ESXi hosts and resetting root passwords, and executing what’s called a “disk-swap” attack to extract the NTDS.dit Active Directory database. The attack works by powering off a Domain Controller (DC) virtual machine (VM) and detaching its virtual disk, only to attach it to another, unmonitored VM under their control. After copying the NTDS.dit file, the entire process is reversed and the DC is powered on.
  • Weaponizing the access to delete backup jobs, snapshots, and repositories to inhibit recovery
  • Using the SSH access to the ESXi hosts to push their custom ransomware binary via SCP/SFTP

“UNC3944’s playbook requires a fundamental shift in defensive strategy, moving from EDR-based threat hunting to proactive, infrastructure-centric defense,” Google said. “This threat differs from traditional Windows ransomware in two ways: speed and stealth.”

The tech giant also called out the threat actors’ “extreme velocity,” stating the whole infection sequence from initial access to data exfiltration and final ransomware deployment can transpire within a short span of a few hours.

According to Palo Alto Networks Unit 42, Scattered Spider actors have not only become adept at social engineering, but also have partnered with the DragonForce (aka Slippery Scorpius) ransomware program, in one instance exfiltrating over 100 GB of data during a two-day period.

To counter such threats, organizations are advised to follow three layers of protections –

  • Enable vSphere lockdown mode, enforce execInstalledOnly, use vSphere VM encryption, decommission old VMs, harden the help desk
  • Implement phishing-resistant multi-factor authentication (MFA), isolate critical identity infrastructure, avoid authentication loops
  • Centralize and monitor key logs, isolate backups from production Active Directory, and make sure they are inaccessible to a compromised administrator
Cybersecurity

Google is also urging organizations to re-architect the system with security in mind when transitioning from VMware vSphere 7, as it approaches end-of-life (EoL) in October 2025.

“Ransomware aimed at vSphere infrastructure, including both ESXi hosts and vCenter Server, poses a uniquely severe risk due to its capacity for immediate and widespread infrastructure paralysis,” Google said.

“Failure to proactively address these interconnected risks by implementing these recommended mitigations will leave organizations exposed to targeted attacks that can swiftly cripple their entire virtualized infrastructure, leading to operational disruption and financial loss.”

You Might Also Like

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

What are the best cities for digital nomads?

Android XR Smart Glasses Updates and News for November 2025

Google November Pixel Drop Adds 7 New Features

WIRED Roundup: Fandom in Politics, Zuckerberg’s Illegal School, and Nepal’s Discord Revolution

TAGGED: Active Directory, Cyber Security, Cybersecurity, data breach, Internet, Ransomware, social engineering, virtualization, VMware
Share This Article
Facebook Twitter Copy Link
Previous Article AI might make workers faster, but not necessarily more productive: ‘They do it faster, then go for coffee breaks’
Next Article Is this US REIT a top buy for long-term passive income?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

What we learned from Ursula von der Leyen’s options paper to support Ukraine
World News
Trump ‘dominates the political scene’ like no other recent U.S. president, says famed diplomat Kishore Mahbubani
Business
Lumines Arise Review – Lights Will Guide You Home
Gaming News
SEC makes no specific mention of crypto in 2026 exam priorities
Crypto
Crypto Exchanges Binance, OKX Used By Criminals To Disguise Illicit Funds, ICIJ Investigation Finds
Crypto
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Tech News
Fox31 parent company buys its broadcast building for $22M
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

What we learned from Ursula von der Leyen’s options paper to support Ukraine

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
What we learned from Ursula von der Leyen’s options paper to support Ukraine
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?