heroui logo

ESXi VSAN Information Discovery Via ESXCLI

Sigma Rules

View Source
Summary
This rule is designed to detect the execution of the 'esxcli' command with the 'vsan' flag, which is often used to gather information about virtual storage configurations in ESXi environments. The detection specifically looks for processes that end with '/esxcli' in the image name and checks for command lines that contain 'vsan' along with specific operations like 'get' or 'list'. Given that certain malware variants, notably DarkSide and LockBit, have been found utilizing this command for reconnaissance on VMware ESXi systems, it is critical to identify such operations as they may indicate malicious intent. This rule thus serves as a proactive measure to alert security teams to potentially harmful activities.
Categories
  • Infrastructure
  • Cloud
  • Linux
Data Sources
  • Process
Created: 2023-09-04