Categories: Cyber Security News

Akira Group Exploits Vulnerabilities, Triggering Surge in Ransomware Attacks on Hyper-V and VMware ESXi

In the latter half of 2025, a new battleground has emerged in ransomware operations the hypervisor layer.

Recent findings from Huntress reveal a sharp increase in hypervisor-targeted ransomware activity, with incidents rising from just 3% in early 2025 to 25% in the second half of the year.

Sponsored

The primary culprit behind this surge is the Akira ransomware group, which has evolved its tactics to compromise both Microsoft Hyper-V and VMware ESXi environments, bypassing traditional endpoint defenses.

Ransomware Moves Down the Stack

Hypervisors, the core software layer managing virtual machines (VMs), are becoming prime targets due to their central role in enterprise infrastructure.

Unlike endpoints, hypervisors often operate with limited visibility and lack advanced protections such as Endpoint Detection and Response (EDR). Once compromised, attackers gain control over potentially hundreds of VMs, enabling mass encryption in minutes.

Huntress researchers note a growing trend in which adversaries, after gaining internal access through stolen credentials or a domain controller compromise, pivot laterally toward the hypervisor management interface.

In ESXi deployments, attackers often exploit misconfigurations in administrative groups, such as the “ESX Admins” Active Directory role, which grants complete administrative control when not adequately secured.

This technique was weaponized in attacks linked to CVE-2024-37085, a critical vulnerability that enables AD-based privilege escalation and can result in a complete host takeover.

Extract from the Huntress Platform detecting an adversary manipulating Hyper-V

Attackers have also been observed leveraging built-in utilities, such as OpenSSL, on compromised hosts to encrypt VM volumes, directly eliminating the need to upload custom ransomware binaries and thereby reducing the likelihood of detection.

Sponsored

In Hyper-V environments, adversaries modify management utilities to turn off VM security controls, tamper with virtual switches, and prepare for large-scale encryption across multiple servers.

Hardening the Hypervisor Layer

Experts emphasize that defending hypervisors requires the same rigor applied to endpoints and servers. Huntress recommends several key steps:

  • Restrict and separate access. Use dedicated local accounts for ESXi management, enforce multi-factor authentication, and segregate management networks from production VLANs.
  • Lock down runtime execution. Enable the VMkernel.Boot.execInstalledOnly = TRUE setting to ensure only signed code runs on ESXi hosts. Disable unused services, such as SSH, and enable lockdown mode.
  • Maintain strict patch management. Keep hosts up to date with the latest vendor patches and disable obsolete services, such as Service Location Protocol (SLP), which have been exploited by groups such as ESXArgs.
  • Implement immutable backups. Store backup images off-network and test complete VM recovery procedures regularly to ensure continuity during ransomware incidents.

As ransomware groups like Akira intensify their focus on hypervisors, organizations must treat virtualization layers as high-value infrastructure and implement strong segmentation, continuous monitoring, and zero-trust principles.

Hypervisor security is no longer optional; it’s essential to preventing mass-encryption events across virtualized enterprise environments.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Akira Group Exploits Vulnerabilities, Triggering Surge in Ransomware Attacks on Hyper-V and VMware ESXi appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Magic’s TMNT Collector Boosters Just Got Another Price Cut at Amazon, and It’s the Best One Yet

Magic: The Gathering’s second set of the year gives us cardboard versions of the Teenage…

39 minutes ago

Pokémon Pokopia Launch Sales Announced, Confirming It’s Off to a Strong Start

Pokémon Pokopia has launched big on Nintendo Switch 2, and sold 2.2 million copies over…

39 minutes ago

City ‘cornerstone’ of public works retires with decades-long legacy of transportation projects

March 11, 2026 Building the first new interchange in 15 years close to the confluence…

2 hours ago

News alert: Qevlar AI raises $30M to turn security alerts into actionable defense insights across SOCs

PARIS, March 10, 2026 — Qevlar AI, a leader in AI for transforming security operations…

2 hours ago

Millenarian Fantasies

In Beirut, we start our days with the latest litany of places and people hit…

2 hours ago

Independent product designer Allan Buntoengsuk uses GreatPen.xyz to share product, UX, and software design work

GreatPen.xyz – Squarespace customer – (United States) The .xyz community includes independent designers and creatives…

2 hours ago

This website uses cookies.