Article Details
Scrape Timestamp (UTC): 2025-12-09 06:42:59.640
Source: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing/
Original Article Text
Click to Toggle View
Researchers spot 700 percent increase in hypervisor ransomware attacks. Get your Hyper-V and VMware ESXi setups in order, people. Researchers at security software vendor Huntress say they’ve noticed a huge increase in ransomware attacks on hypervisors and urged users to ensure they’re as secure as can be and properly backed up. “Huntress case data revealed a stunning surge in hypervisor ransomware: its role in malicious encryption rocketed from just three percent in the first half of the year to 25 percent so far in the second half,” wrote Senior Hunt & Response Analyst Anna Pham, Technical Account Manager Ben Bernstein, and Senior Manager for Hunt & Response, Dray Agha in a Monday post. “The primary actor driving this trend is the Akira ransomware group,” the trio warned, adding that the gang, and other attackers, are going after hypervisors “in an attempt to circumvent endpoint and network security controls.” Huntress’s threat hunters think ransomware scum are going after hypervisors because they’re not well defended, and cracking them means attackers can mess with the virtual machines and networks they manage. “This shift underscores a growing and uncomfortable trend: Attackers are targeting the infrastructure that controls all hosts, and with access to the hypervisor, adversaries dramatically amplify the impact of their intrusion,” the researchers wrote. Attacks on hypervisors follow “a familiar playbook,” the trio wrote. “We've seen it with attacks on VPN appliances: Threat actors realize that the host operating system is often proprietary or restricted, meaning defenders cannot install critical security controls like EDR [Endpoint Detection and Response]. This creates a significant blind spot.” Huntress has observed “multiple cases where ransomware operators deploy ransomware payloads directly through hypervisors, bypassing traditional endpoint protections entirely. In some instances, attackers leverage built-in tools such as OpenSSL to perform encryption of the virtual machine volumes, avoiding the need to upload custom ransomware binaries.” The researchers also see attackers compromise a network, steal authentication credentials, and then target hypervisors. “We’ve seen misuse of Hyper-V management utilities to modify VM settings and undermine security features,” they add. “This includes disabling endpoint defenses, tampering with virtual switches, and preparing VMs for ransomware deployment at scale.” Given the elevated level of attacks on hypervisors, the researchers recommend admins revisit some infosec basics like ensuring the use of multi-factor authentication and complex passwords, and staying up to date with patches. They also suggest adopting some hypervisor-specific defences, such as using settings that ensure only allow-listed binaries can run on a host. Ensuring Security Information and Event Management systems ingest and analyze hypervisor logs is also on the researchers’ to-do list. Infosec folks have known for decades that the hypervisor is a very tasty target, especially in the worst-case scenario of a successful VM escape in which an attack on a guest virtual machine allows takeover of the host and its hypervisor. Were such an attack to become possible, the consequences could be immense given that all hyperscale clouds rely on hypervisors to isolate tenants’ virtual machines.
Daily Brief Summary
Huntress researchers report a 700% increase in ransomware attacks targeting hypervisors, with incidents rising from 3% to 25% in the latter half of the year.
The Akira ransomware group is identified as a primary actor, exploiting hypervisors to bypass traditional endpoint and network security controls.
Hypervisors, often lacking robust defenses, allow attackers to manipulate virtual machines and networks, amplifying the impact of intrusions.
Attackers deploy ransomware directly through hypervisors, using built-in tools like OpenSSL for encryption, sidestepping the need for custom binaries.
Compromised networks and stolen credentials facilitate attacks, with misuse of Hyper-V utilities to disable defenses and prepare VMs for ransomware.
Recommendations include implementing multi-factor authentication, complex passwords, timely patching, and hypervisor-specific defenses to mitigate risks.
Ensuring comprehensive log analysis through Security Information and Event Management systems is crucial for early detection and response.
The potential for VM escape attacks poses significant risks to hyperscale cloud environments, necessitating urgent attention to hypervisor security.