Chinese threat actors have been actively exploiting a VMware zero-day vulnerability since October 2024, targeting organizations worldwide. This critical security flaw allows attackers to execute arbitrary code remotely, posing significant risks to enterprise environments relying on VMware products. The exploitation campaign has been linked to a sophisticated Chinese hacking group known for its advanced persistent threat (APT) operations. Security researchers urge organizations to apply patches and implement mitigation strategies immediately to prevent further compromise. The zero-day vulnerability, identified as CVE-2024-XXX, affects multiple VMware products, enabling attackers to bypass security controls and gain unauthorized access. This ongoing exploitation highlights the increasing trend of state-sponsored cyberattacks leveraging zero-day vulnerabilities to infiltrate high-value targets. Enterprises are advised to enhance their monitoring capabilities and update incident response plans accordingly. The cybersecurity community continues to track the threat actor's tactics, techniques, and procedures (TTPs) to better defend against similar attacks in the future.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Tue, 30 Sep 2025 14:55:39 +0000