New Scattered Spider Tactics Target VMware vSphere Environments

by CybrGPT
0 comment

A sophisticated and highly targeted cyber-attack campaign has been identified by security researchers in Google’s Threat Intelligence Group (GTIG).

A new report has revealed how the financially motivated threat group UNC3944, also known as Scattered Spider, has pivoted its operations to exploit VMware vSphere environments across the US retail, airline and insurance sectors.

Scattered Spider actors have also adopted an aggressive, low-exploit playbook focused on social engineering and infrastructure abuse.

Their strategy begins with phone-based impersonation to breach IT help desks, ultimately enabling access to Active Directory. From there, attackers methodically map administrative systems, escalate privileges and move laterally into the virtual infrastructure, without triggering traditional endpoint defenses.

Direct Hypervisor-Level Attacks

In an advisory published last week,  the GTIG reported that UNC3944 has developed an attack model that bypasses conventional detection by compromising the vSphere virtualization layer. Once inside, the group hijacks vCenter administrative access and abuses legitimate tools to control hypervisors, manipulate virtual disks and install persistent backdoors.

Their technique involves taking over VMware vCenter Server, rebooting it into single-user mode and deploying Teleport, a legitimate remote access tool configured to maintain covert control. Then, they pivot into ESXi hosts to steal credential databases and launch ransomware directly from the hypervisor level, rendering in-guest security tools ineffective.

Read more on VMware-focused attacks: VMware Warns Customers to Patch Actively Exploited Zero-Day Vulnerabilities

Key Targets and Methods

UNC3944’s campaign is marked by several high-impact tactics:

  • Social engineering IT help desks to reset passwords of privileged accounts

  • Hijacking vSphere Admin roles to access VMware vCenter

  • Using “orphaned” virtual machines to mount and copy domain controller disks

  • Disabling backup systems before deploying ransomware

  • Executing ransomware from the ESXi shell to encrypt entire environments

These attacks are fast and stealthy. GTIG warned that from initial access to ransomware deployment, the full chain may unfold in mere hours.

Defensive Measures and Industry Outlook

The research emphasizes a shift from reactive endpoint detection to proactive infrastructure hardening. 

GTIG outlined a three-pillar defense strategy, proactive configuration, architectural segregation and advanced SIEM detection. They recommended disabling direct ESXi shell access, encrypting VM data, isolating backup systems and enforcing phishing-resistant multi-factor authentication.

“The threat is immediate, and the attack chain is proven,” the report concluded. “Successful hypervisor-level tactics leveraged by groups like UNC3944 are no longer exclusive; these same TTPs are now being actively adopted by other ransomware groups. This proliferation turns a specialized threat into a mainstream attack vector, making the time to act now.”

Source link

You may also like

Leave a Comment

Stay informed with the latest in cybersecurity news. Explore updates on malware, ransomware, data breaches, and online threats. Your trusted source for digital safety and cyber defense insights.

BuyBitcoinFiveMinute

Subscribe my Newsletter for new blog posts, tips & new photos. Let’s stay updated!

© 2025 cybrgpt.com – All rights reserved.