Analytics Story: ESXi Post Compromise
Description
This analytic story contains detections for malicous activity on VMware ESXi. Adversaries who gain access to an ESXi shell or exploit management interfaces may attempt to maintain persistence, disrupt virtual machines, modify security settings, or prepare for lateral movement.
Why it matters
Ransomware groups have been observed abusing ESXi to deploy malware and encrypt virtual machines. This story focuses on detecting potential post-compromise activities. It aims to help defenders identify and respond to attacks on ESXi systems in their environments.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
VMWare ESXi Syslog | N/A | vmw-syslog |
vmware:esxlog |
References
Source: GitHub | Version: 1