

Convert a virtual machine into a template.Configure guest customization specifications.Open a virtual machine console on VMware vCenter Server® and access the guest operating system.


It's possible that the groups' developers shared resources, such as stolen certificates and C2 infrastructure, with each other. "The reason these tools are linked to two different groups is unclear at this time. The report also found that the Deep Panda campaign had significant similarities with the Chinese hacking group Winnti. Fire Chili then works to conceal file operations, processes, malicious network connections, and registry key additions from the user with the use of input/output control system calls. Launching the rootkit prompts the execution of basic system tests to evaluate kernel structures and ensure its absence in a simulated environment. BleepingComputer reports that VMware Horizon servers vulnerable to Log4Shell are being targeted by Chinese advanced persistent threat group Deep Panda to distribute the novel Fire Chili rootkit.įortinet researchers discovered that Deep Panda has been deploying Fire Chili, which has been signed with certificates either from game developer Frostburn Studios or security software Comodo, to bypass antivirus systems.
