Multiple ransomware groups are actively exploiting unpatched VMware ESXi hypervisors to encrypt virtual machine disk files, causing catastrophic outages. Apply all available patches immediately.
Multiple ransomware groups are conducting a coordinated mass exploitation campaign targeting VMware ESXi hypervisors running unpatched versions of ESXi. Unlike traditional ransomware attacks that target individual workstations or servers, these attacks target the hypervisor itself — the software layer that runs all virtual machines. By compromising the hypervisor, attackers can encrypt the virtual machine disk files (VMDK files) of all VMs running on the host simultaneously, causing catastrophic outages affecting every system running on the affected infrastructure. Organizations that run their entire IT infrastructure on VMware ESXi can lose access to all systems at once.
The campaign is primarily exploiting three VMware vulnerabilities: CVE-2025-22224 (a critical heap overflow in VMCI that allows guest-to-host escape), CVE-2025-22225 (an arbitrary write vulnerability in ESXi), and CVE-2025-22226 (an information disclosure vulnerability in HGFS). These vulnerabilities were patched by VMware in early 2025, but many organizations have not applied the patches. Attackers are scanning the internet for exposed ESXi management interfaces and exploiting unpatched systems. The exploitation is largely automated, allowing attackers to compromise hundreds of systems in a short period.
Apply all available VMware ESXi patches immediately — this is an emergency situation. If you cannot patch immediately, restrict access to the ESXi management interface (port 443 and 902) to trusted IP addresses only and ensure it is not accessible from the internet. Verify that your VM backups are current and stored in an immutable location that cannot be accessed from the ESXi host. Check your ESXi hosts for signs of compromise including unexpected VM snapshots, configuration changes you did not make, or unusual network connections. If you find evidence of compromise, do not attempt to recover on your own — contact a cybersecurity incident response team immediately.
Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.
Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.