MITRE shared new lessons from its own cyberattack in a blog post Wednesday, describing how China state-sponsored threat actor UNC5221 used rogue virtual machines (VMs) to evade detection and establish persistence in its VMware environment.MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE) was compromised in January with the threat actors leveraging two Ivanti Connect Secure zero-days for initial access. The intrusion was discovered in April.The latest blog post dives further into the tactics MITRE’s cyberattackers used to persist undetected in the organization’s VMware environment. The attackers, having already gained administrative access to the MITRE NERVE ESXi infrastructure, used the default service account VPXUSER to create several rogue VMs.The rogue VMs remained hidden due to their creation via VPXUSER directly on the hypervisor instead of through the vCenter administrative console, the blog post explained. Accounts created this way do not appear in the vCenter inventory. The attackers deployed a backdoor called BRICKSTORM within the rogue VMs, enabling communication with both the attacker’s command-and-control (C2) servers and administrative subnets within NERVE, MITRE said. They also deployed the JSP web shell BEEFLUSH under the vCenter Server’s Tomcat server to execute a Python-based tunneling tool that created SSH connections between the rogue VMs and ESXi hypervisors.
Network Security, Threat Intelligence, Breach
MITRE shares lessons on VMware rogue VMs used in its own cyberattack

An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds