Adversaries may abuse ESXi administration services to execute commands on guest machines hosted within an ESXi virtual environment. Persistent background services on ESXi-hosted VMs, such as the VMware Tools Daemon Service, allow for remote management from the ESXi server. The tools daemon service runs as vmtoolsd.exe
on Windows guest operating systems, vmware-tools-daemon
on macOS, and vmtoolsd
on Linux.[1]
Adversaries may leverage a variety of tools to execute commands on ESXi-hosted VMs – for example, by using the vSphere Web Services SDK to programmatically execute commands and scripts via APIs such as StartProgramInGuest
, ListProcessesInGuest
, ListFileInGuest
, and InitiateFileTransferFromGuest
.[2][3] This may enable follow-on behaviors on the guest VMs, such as File and Directory Discovery, Data from Local System, or OS Credential Dumping.
ID | Mitigation | Description |
---|---|---|
M1018 | User Account Management |
If not required, restrict the permissions of users to perform Guest Operations on ESXi-hosted VMs.[4] |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0015 | Application Log | Application Log Content |
Monitor for Guest Operations API calls executed from the ESXi host to a guest VM, especially:- Sudden usage from ESXi management accounts (especially out of hours). Use of Guest Ops on VMs where Analytic 1 - ESXi Abuse
|