Akira Group Exploits Vulnerabilities, Triggering Surge in Ransomware Attacks on Hyper-V and VMware ESXi
Recent findings from Huntress reveal a sharp increase in hypervisor-targeted ransomware activity, with incidents rising from just 3% in early 2025 to 25% in the second half of the year.
The primary culprit behind this surge is the Akira ransomware group, which has evolved its tactics to compromise both Microsoft Hyper-V and VMware ESXi environments, bypassing traditional endpoint defenses.
Hypervisors, the core software layer managing virtual machines (VMs), are becoming prime targets due to their central role in enterprise infrastructure.
Unlike endpoints, hypervisors often operate with limited visibility and lack advanced protections such as Endpoint Detection and Response (EDR). Once compromised, attackers gain control over potentially hundreds of VMs, enabling mass encryption in minutes.
Huntress researchers note a growing trend in which adversaries, after gaining internal access through stolen credentials or a domain controller compromise, pivot laterally toward the hypervisor management interface.
In ESXi deployments, attackers often exploit misconfigurations in administrative groups, such as the “ESX Admins” Active Directory role, which grants complete administrative control when not adequately secured.
This technique was weaponized in attacks linked to CVE-2024-37085, a critical vulnerability that enables AD-based privilege escalation and can result in a complete host takeover.
Attackers have also been observed leveraging built-in utilities, such as OpenSSL, on compromised hosts to encrypt VM volumes, directly eliminating the need to upload custom ransomware binaries and thereby reducing the likelihood of detection.
In Hyper-V environments, adversaries modify management utilities to turn off VM security controls, tamper with virtual switches, and prepare for large-scale encryption across multiple servers.
Experts emphasize that defending hypervisors requires the same rigor applied to endpoints and servers. Huntress recommends several key steps:
As ransomware groups like Akira intensify their focus on hypervisors, organizations must treat virtualization layers as high-value infrastructure and implement strong segmentation, continuous monitoring, and zero-trust principles.
Hypervisor security is no longer optional; it’s essential to preventing mass-encryption events across virtualized enterprise environments.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Akira Group Exploits Vulnerabilities, Triggering Surge in Ransomware Attacks on Hyper-V and VMware ESXi appeared first on Cyber Security News.
Magic: The Gathering’s second set of the year gives us cardboard versions of the Teenage…
Pokémon Pokopia has launched big on Nintendo Switch 2, and sold 2.2 million copies over…
March 11, 2026 Building the first new interchange in 15 years close to the confluence…
PARIS, March 10, 2026 — Qevlar AI, a leader in AI for transforming security operations…
In Beirut, we start our days with the latest litany of places and people hit…
GreatPen.xyz – Squarespace customer – (United States) The .xyz community includes independent designers and creatives…
This website uses cookies.