When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Namely, taking advantage of CVE-2024-37085, an authentication bypass vulnerability found in VMware ESXi.
In fact, the researchers believe only 20-30% of successful attacks end up on the data leak site.
Image credit: Pixabay
Since the source code leaked, different other groups stepped in, with BlackByte likely being one of them.
It was also observed using known-good system binaries (LoLBins), and other legitimate commercial tools.