Detection Strategy for ESXi Hypervisor CLI Abuse

Technique Detected:  Hypervisor CLI | T1059.012

ID: DET0558
Domains: Enterprise
Analytics: AN1537
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1537

Detects suspicious use of ESXi native CLI tools like esxcli and vim-cmd by unauthorized users or outside expected maintenance windows. Focus is on actions such as stopping VMs, reconfiguring network/firewall settings, and enabling SSH or logging.

Log Sources
Data Component Name Channel
Command Execution (DC0064) esxi:vmkernel esxcli, vim-cmd invocation
User Account Authentication (DC0002) esxi:auth SSH session/login
Mutable Elements
Field Description
TimeWindow Helps scope detection to off-hours or change control gaps.
UserContext Environment-specific users may run these commands as part of normal ops.
CommandPattern CLI commands vary by adversary intent (e.g., 'stop', 'reboot', 'firewall set')