Skip to content

Chinese Cyberespionage Group 'Fire Ant' Exploits VMware, F5 Vulnerabilities

Fire Ant's sophisticated attacks highlight the group's advanced capabilities. They exploit VMware and F5 flaws to gain unauthorized access to restricted networks.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

Chinese Cyberespionage Group 'Fire Ant' Exploits VMware, F5 Vulnerabilities

A Chinese cyberespionage group, known as Fire Ant, has been exploiting vulnerabilities in VMware and F5 products since early 2025. The group targets virtualization and networking infrastructure, primarily VMware ESXi and vCenter environments.

Fire Ant compromises networks by exploiting flaws in F5 load balancers, such as CVE-2022-1388 in the iControlREST API. They use stealthy, layered attack chains to bypass network segmentation and access restricted networks thought to be isolated.

The group starts its attack chain by exploiting critical vulnerabilities like CVE-2023-34048 in vCenter Server. They move laterally to ESXi hosts using stolen vpxuser credentials and deploy persistent backdoors. To maintain long-term access, Fire Ant deploys a variant of the open-source Medusa rootkit on key Linux pivot points. They also exploit CVE-2023-20867 to run commands without credentials and extract credentials from memory snapshots.

Fire Ant's sophisticated attacks, which involve bypassing network segmentation, exploiting VMware and F5 flaws, and deploying persistent backdoors, highlight the group's advanced capabilities. Despite not being explicitly identified, the group's activities pose significant threats to virtualized and network infrastructure.

Read also:

Latest