Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Massive ransomware operation targets VMware ESXi

Researcher by Researcher
February 8, 2023
in Networking
0
Massive ransomware operation targets VMware ESXi
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the most targeted countries and how to secure your organization.

Ransomware on a screen and a person with his head in his hands.
Image: Adobe Stock

Jump to:

How does this ransomware attack operate?

CVE-2021-21974 is a vulnerability affecting OpenSLP as used in VMware ESXi. Successful exploitation of that vulnerability allows an attacker to execute arbitrary code, and exploits for this vulnerability can be found in various open sources since May 2021.

Related articles

Support for these Microsoft enterprise products ends in 2023

Support for these Microsoft enterprise products ends in 2023

June 6, 2023
How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023

Must-read security coverage

The French government’s Computer Emergency Response Team CERT-FR was the first to raise an alert on ransomware exploiting this vulnerability on Feb. 3, 2023, quickly followed by French hosting provider OVH.

Attackers can exploit the vulnerability remotely and unauthenticated via port 427 (Service Location Protocol, SLP), which is a protocol that most VMware customers do not use.

The ransomware encrypts files with the following extensions on the affected systems: .vmdk, .vmxf, .vmsd, .vmsn, .vmss, .vswp, .nvram and .vmem. Then, it tries to shut down the virtual machines by killing the VMX process to unlock the files.

A text note is left after encryption is done (Figure A), asking for ransom that must be paid in Bitcoin cryptocurrency within three days.

Figure A

Ransom note left on a targeted device.
Image: Twitter. Ransom note left on a targeted device.

The ransomware threat actor behind this attack is not known, as the malware seems to be a new ransomware. OVH has reported that according to several security researchers, the encryption cipher used in the ransomware is the same as what was used in the leaked Babuk malware code from September 2021, although the code structure is different.

The Babuk code that leaked in 2021 has been used to create other malware that often targets ESXi systems, but it seems too early to draw a definitive conclusion as to the attribution of that new malware, which has been dubbed ESXiArgs by security researchers.

France and U.S. are the biggest targets

Censys Search, an online tool for searching through internet-connected devices, shows that more than 1,000 servers have been successfully hit by the ransomware, mostly in France, followed by the U.S. and Germany.

At the time of writing, more than 900 servers were compromised in France, while approximately 400 servers in the U.S. were hit.

A lot more systems might be vulnerable and not yet attacked. The Shadowserver Foundation reports that around 27,000 instances may be vulnerable, according to the version of its VMware software.

How to protect your organization from this ransomware threat

For systems running unpatched versions of VMware ESXi, the absolute priority is to cut the SLP service if it runs. The vulnerability can only be exploited via that service, so if it is closed, the system cannot be attacked via this vector.

The next step consists of reinstalling the hypervisor in a version supported by VMware — ESXi 7.x or ESXi 8.x — and applying all security patches.

Finally, all administration services should be protected and only available locally. In case there is a need for remote access, VPN with multi-factor authentication or IP filtering should be used.

Jan Lovmand, chief technology officer of BullWall, a cybersecurity firm focused on preventing ransomware attacks, told TechRepublic more about the vulnerability.

“A patch has been available from VMware since February 2021 when the vulnerability was discovered,” Lovmand said. “This just goes to show how long it takes many organizations to get around to patch internal systems and applications, which is just one of many reasons why the criminals keep finding their way in. The attack surface is big, and preventative security solutions can be bypassed in a scenario like this if the vulnerability has not been patched.”

Lovmand also stressed the importance of patching your networks.

“It’s 50-50 odds that your company will be successfully hit with ransomware in 2023,” he said. “Security solutions cannot protect unpatched networks.”

How to recover from this ransomware threat

Security researchers Enes Somnez and Ahmet Aykac have provided a solution to recover in case a system has been attacked by this ransomware.

The researchers explain that the ransomware encrypts small files like .vmdk and .vmx but not the server-flat.vmdk file, which contains the actual data. Using this file, it’s possible to do a fallback and recover information from the system.

Julien Levrard, chief information security officer from OVHCloud, wrote that the method documented by Somnez and Aykac has been tested by OVH as well as many security experts with success on several impacted servers, with a success rate of 2/3. He added that “this procedure requires strong skills on ESXi environments.”

Disclosure: I work for Trend Micro, but the views expressed in this article are mine.

Read next: Patch management policy (TechRepublic Premium)





Source link

Tags: ESXiMassiveoperationRansomwaretargetsVMware
Share76Tweet47

Related Posts

Support for these Microsoft enterprise products ends in 2023

Support for these Microsoft enterprise products ends in 2023

June 6, 2023
0

Image: Pixabay Microsoft has a policy that limits application support to ten years for most products without a defined lifecycle....

How to join a node to a Docker Swarm

How to join a node to a Docker Swarm

May 27, 2023
0

Jack Wallen shows you the steps of joining new nodes to a Docker Swarm as a worker and manager to...

What Is IBM Hybrid Cloud Mesh?

Gartner releases 4 trends that will impact enterprises in 2023

May 27, 2023
0

Image: metamorworks/Adobe Stock Enterprise infrastructure and operations teams will have to cope with economic and geopolitical pressures as they pivot...

Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy exposes RSR update gap in 25% of managed macOS devices

May 25, 2023
0

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed...

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

Dell Reveals New Edge as-a-Service Portfolio, NativeEdge

May 24, 2023
0

Dell also zeroed in on zero trust and introduced a modular deployment service as part of its new edge offerings....

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Apple launches Vision Pro & more new products

Apple launches Vision Pro & more new products

June 7, 2023
Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023

Recent Posts

Apple launches Vision Pro & more new products

Apple launches Vision Pro & more new products

June 7, 2023
Ransomware, DDoS see major upsurge led by upstart hacker group

DDoS attacks dominate and pretexting lead to BEC growth

June 7, 2023
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved