Hypervisor CLI - T1059.012 (d2d642da-61ff-4211-b4df-7923c9ca220c)
Adversaries may abuse hypervisor command line interpreters (CLIs) to execute malicious commands. Hypervisor CLIs typically enable a wide variety of functionality for managing both the hypervisor itself and the guest virtual machines it hosts.
For example, on ESXi systems, tools such as esxcli
and vim-cmd
allow administrators to configure firewall rules and log forwarding on the hypervisor, list virtual machines, start and stop virtual machines, and more.(Citation: Broadcom ESXCLI Reference)(Citation: Crowdstrike Hypervisor Jackpotting Pt 2 2021)(Citation: LOLESXi) Adversaries may be able to leverage these tools in order to support further actions, such as File and Directory Discovery or Data Encrypted for Impact.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | Hypervisor CLI - T1059.012 (d2d642da-61ff-4211-b4df-7923c9ca220c) | Attack Pattern | 1 |