On September 13th, VMware advised the migration would take place between the 19th and 21st, and that the upgrade process would mean the existing VMware Cloud Services Portal became read-only. On the last day of the planned migration VMware wrote to customers "to inform you that the anticipated transition of the VMware Cloud Services Portal to the new Cloud Services Console on Broadcom will not be going live on September 21 as originally communicated."
The threat actor leveraged combinations of sophisticated and stealthy techniques creating multilayered attack kill chains to facilitate access to restricted and segmented network assets within presumed to be isolated environments.
Over the past few weeks, VMware customers holding onto their perpetual licenses, which are often unsupported and in limbo, have reportedly begun receiving formal cease-and-desist letters from Broadcom.
"This is the first time VMware ESXi was exploited in the Pwn2Own hacking event," Praveen Singh and Monty Ijzerman, from the product security and incident response team in the VMware Cloud Foundation division of Broadcom, wrote on the company's website.