Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Source: The Hacker News

Author: The Hacker News

URL: https://thehackernews.com/2025/07/fire-ant-exploits-vmware-flaw-to.html

ONE SENTENCE SUMMARY:

Fire Ant, linked to China’s UNC3886, targets virtualization and networking infrastructure using stealthy methods for cyber espionage.

MAIN POINTS:

  1. Fire Ant targets VMware ESXi, vCenter, and network appliances in cyber espionage.
  2. Uses sophisticated techniques for multilayered attack chains accessing segmented networks.
  3. Shares attributes with UNC3886, a known China-nexus cyber espionage group.
  4. Establishes control in VMware environments and bypasses network segmentation.
  5. Exploits vulnerabilities, notably CVE-2023-34048 and CVE-2023-20867, for prolonged access.
  6. Deploys persistent backdoors and Python-based implants for remote command execution.
  7. Facilitates network tunneling and compromises F5 load balancers using CVE-2022-1388.
  8. Maintains low intrusion footprint by tampering with logging and using stealth techniques.
  9. Highlighted as a threat to national security by Singapore’s Minister for National Security.
  10. Operates covertly, targeting under-secured infrastructure layers lacking detection solutions.

TAKEAWAYS:

  1. The campaign shows advanced, stealthy intrusions targeting critical network infrastructure.
  2. Fire Ant demonstrates persistent, sophisticated cyber espionage capabilities.
  3. Traditional security tools struggle to detect hypervisor and network infrastructure attacks.
  4. The threat extends risks to critical infrastructures beyond regional borders.
  5. UNC3886’s activities raise significant national security concerns globally.