Splunk has released a specialized security guide designed to help cybersecurity teams detect and prevent ransomware attacks targeting VMware ESXi infrastructure before significant damage occurs.
This release comes amid rising cyber threats against ESXi hypervisor systems, which have become prime ransomware targets due to their centralized role in virtualization and the lack of sufficient monitoring in many environments.
The guide provides step-by-step detection methods, example queries, and configuration instructions, enabling organizations to strengthen their security posture against attacks capable of encrypting entire virtualized infrastructures within a short time.
Key Highlights
- Splunk has introduced advanced detection queries to identify malicious ESXi activities.
- The guide outlines methods to monitor ESXi logs via syslog forwarding, with complete technical implementation code.
- VMware ESXi hypervisors remain high-value targets for ransomware, as they can be encrypted in full very quickly.
Comprehensive ESXi Ransomware Detection Framework
Security researchers have crafted an in-depth “analytic story” tailored to detect malicious activities on ESXi systems through complete log analysis.
The guide stresses the importance of enabling ESXi logging and forwarding syslog data to external monitoring tools. Splunk recommends using Splunk Connect for Syslog, a containerized syslog-ng server pre-configured for security data ingestion.
For direct monitoring, organizations can use dedicated syslog servers with Universal Forwarders or take advantage of direct ingestion capabilities.
Sample Detection Query for Reconnaissance
The detection toolkit includes specialized queries for spotting reconnaissance activities, such as System Information Discovery

Monitoring Suspicious Account Activities
Additional high-priority detections focus on identifying:
- External root login attempts.
- Unauthorized assignment of administrator roles, for example, through commands like:

Essential ESXi Log Types for Threat Detection
The guide explains the primary log categories that security teams must track:
- Shell Logs: Record executed commands, including both shell operations and
esxcliinteractions. - Hostd Logs: Track host service management, virtual machine lifecycle activities, and authentication attempts.
- VMK Warning Logs: Filtered
vmkernelevents that highlight warning-level system activity. - Update Logs: Monitor VIB (vSphere Installation Bundle) changes, which can reveal potential backdoor installations.
Critical Detection Capabilities
Security teams are advised to monitor:
- VIB acceptance level changes using
esxcli software acceptance set. - SSH service enablement.
- Virtual machine export attempts via NFC protocol exploitation.

Detecting Log Tampering and Advanced Evasion
The framework includes methods to identify:
- Audit log tampering attempts through
esxcli system auditrecords. - Syslog configuration changes that could disable monitoring.
- System clock manipulation via NTPClock monitoring, a known tactic used by advanced threat actors to evade timestamp-based detection.
Conclusion
By following Splunk’s recommendations, organizations can significantly improve their ability to detect ransomware activity early, mitigate risks, and secure ESXi environments against advanced attacks.


