Instead of attacking the VM itself, hackers focus on the platform the VM runs on that can be compromised in Hypervisor.