VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
https://securelist.com/malware-report-q3-2024-non-mobile-statistics/114695/
https://blog.talosintelligence.com/incident-response-trends-q3-2024/
https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
https://thehackernews.com/2024/08/blackbyte-ransomware-exploits-vmware.html
https://securityaffairs.com/167695/malware/blackbyte-ransomware-vmware-esxi-flaw.html
https://securityaffairs.com/166432/hacking/vmware-esxi-cve-2024-37085-vulnerable-instances.html