1 min read
VMware ESXi Vulnerability (CVE 2025 22225)
Summary
3 min read
IronGate
Apr 25, 2026 5:45:44 PM
For immediate assistance with a network intrusion, ransomware
attack, or BEC, please contact: IrongateResponse@irongatesecurity.com
This incident wasn’t a VMware exploit, it was an identity-driven takeover that ended at the hypervisor. IronGate responders determined that the attacker first compromised a Domain Administrator account, then deliberately moved through the environment to seize control of VMware management components. That access chain culminated in full administrative control of the ESXi host.
Once inside the hypervisor, the attacker deployed the Kyber ransomware ESXi variant, instantly disrupting multiple virtual machines in a single action. Ransom notes were written directly to ESXi datastores, and the ESXi web management interface was defaced, replacing the login page with a ransom message shown before authentication. This wasn’t vandalism. Rather, it was a signal. The attacker had total control of the virtualization layer, and every recovery attempt would start by staring at the ransom demand.
IronGate responded to a ransomware incident impacting a VMware‑based enterprise environment. During the investigation, IronGate identified evidence indicating that the threat actor likely achieved an initial foothold by compromising a Domain Administrator account, rather than directly exploiting a hypervisor-side vulnerability.
Once Domain Administrator privileges were obtained, the threat actor was observed conducting post‑compromise activity consistent with deliberate infrastructure targeting, including lateral movement and escalation into VMware management components. This access ultimately enabled full administrative control of the ESXi host.
Upon obtaining hypervisor‑level access, the attacker deployed the Kyber ransomware ESXi variant, resulting in:
The defacement of the ESXi login page served as a clear indicator of root‑level control over the hypervisor and was consistent with Kyber’s documented tradecraft. The action also increased psychological pressure by ensuring that any attempt at administrative recovery immediately encountered the ransom demand.
Kyber is a relatively new but highly impactful ransomware operation observed in early 2026. Unlike traditional endpoint‑centric ransomware, Kyber is engineered for dual‑platform deployment, with affiliates deploying:
Rapid7 confirmed that both payloads were deployed in the same victim environment during a March 2026 incident, demonstrating deliberate coordination to maximize operational disruption rather than opportunistic spread.
From IronGate’s perspective, the ESXi component represents the most operationally dangerous aspect of Kyber. By targeting the hypervisor directly, attackers bypass traditional endpoint recovery strategies and disable entire clusters of dependent systems in a single action.
The defacement of the ESXi web UI in this incident was not incidental and should not be treated as cosmetic damage. In our assessment, it served several clear attacker objectives:
Rapid7’s analysis of Kyber confirms this behavior as an intentional tactic, with the ESXi variant capable of encrypting datastores, terminating running VMs, and defacing management interfaces to guide victims through ransom payment.
From IronGate’s incident response findings, several defensive takeaways are clear:
Kyber’s emphasis on virtualization infrastructure reinforces a growing trend: ransomware operators are no longer satisfied with encrypting systems; they are increasingly seizing the control plane itself.
These actions highlight a broader and accelerating shift in ransomware operations: attackers are no longer focused solely on encrypting systems; they are targeting the control plane that runs them. By compromising identity infrastructure first and then pivoting into virtualization management, threat actors can achieve outsized impact with precision and speed.
Kyber’s use of ESXi management interface defacement emphasizes this evolution. It serves as proof of full control, amplifies psychological pressure, and removes ambiguity for defenders about the seriousness of the compromise. Once ransomware reaches the hypervisor layer, technical recovery options become extremely limited.
For defenders, the central lesson is clear: hypervisor compromise is rarely the beginning of an intrusion: it is the endgame. Preventing these outcomes depends far more on identity protection, access segmentation, and visibility into administrative activity than on traditional endpoint defenses alone. As ransomware continues to evolve toward seizing infrastructure control rather than individual systems, organizations must adapt accordingly or risk losing entire environments in a single, coordinated strike.
Recent Ransomware Variants
![]() |
|
|
Recent Engagement Types
![]() |
|
|
Contact us today to learn more about our Digital Forensics and Incident Response (DFIR) services.
1 min read
For immediate assistance with a network intrusion, ransomwareattack, or BEC, please contact: IrongateResponse@irongatesecurity.com