We’re currently reading Google’s reporting on VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/
One of the big updates for ATT&CK v17 was the new platform ESXi which reflects the rise in attacks on virtualization infrastructure. The technique we’re spotlighting today is new to ATT&CK: T1675 ESXi Administration Command https://attack.mitre.org/techniques/T1675/
T1675 describes activity in which an adversary abuses ESXi admin services to execute commands on guest machines.
Google’s reporting details the threat actor UNC3886, Chinese cyber espionage group, using a zero-day vulnerability that enabled the execution of privileged commands across guest virtual machines without authentication of guest credentials from a compromised ESXi host and no default logging on guest VMs.
Read up on Google’s reporting: https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/
And make sure to check out the ESXi material on ATT&CK including T1675 https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/
And see the entire v17 release for more information https://medium.com/mitre-attack/attack-v17-dfb59eae2204