When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Namely, taking advantage of CVE-2024-37085, an authentication bypass vulnerability found in VMware ESXi.

In fact, the researchers believe only 20-30% of successful attacks end up on the data leak site.

ID theft

Image credit: Pixabay

Since the source code leaked, different other groups stepped in, with BlackByte likely being one of them.

It was also observed using known-good system binaries (LoLBins), and other legitimate commercial tools.

More from TechRadar Pro