
Summary
This detection rule aims to identify the potentially malicious installation of VMware Installation Bundles (VIBs) on ESXi hosts when the installation command is executed with the `--force` flag. The `--force` option allows bypassing critical validation checks including signature verification and compatibility checks, making it a risky command often exploited in adversarial scenarios. This behavior is atypical for standard operational protocols and is predominantly seen in compromised environments, where attackers seek to deploy backdoored modules, unauthorized drivers, or persistent monitoring tools to gain elevated control over the hypervisor. The rule utilizes syslog data from VMware ESXi, capturing specific log messages that indicate the emulation of standard administrative actions while revealing potential compromises. The rule's outputs detail both the first and last occurrence of the malicious activity, enhancing response capabilities for security teams.
Categories
- Infrastructure
- Endpoint
- Cloud
Data Sources
- Volume
- Process
- Application Log
ATT&CK Techniques
- T1505.006
Created: 2025-05-09