• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

Sergiu Gatlan by Sergiu Gatlan
February 3, 2023
Reading Time: 3 mins read
0
New Python malware backdoors VMware ESXi servers for remote access

VMware

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy ransomware.

Tracked as CVE-2021-21974, the security flaw is caused by a heap overflow issue in the OpenSLP service that can be exploited by unauthenticated threat actors in low-complexity attacks.

“As current investigations, these attack campaigns appear to be exploiting the vulnerability CVE-2021-21974, for which a patch has been available since 23 February 2021,” CERT-FR said.

“The systems currently targeted would be ESXi hypervisors in version 6.x and prior to 6.7.”

To block incoming attacks, admins have to disable the vulnerable Service Location Protocol (SLP) service on ESXi hypervisors that haven’t yet been updated.

CERT-FR strongly recommends applying the patch as soon as possible but adds that systems left unpatched should also be scanned to look for signs of compromise.

Buy JNews
ADVERTISEMENT

CVE-2021-21974 affects the following systems:

  • ESXi versions 7.x prior to ESXi70U1c-17325551
  • ESXi versions 6.7.x prior to ESXi670-202102401-SG
  • ESXi versions 6.5.x prior to ESXi650-202102101-SG

Mathieu Feuillet warning ESXi

​French cloud provider OVHcloud has also published a report today linking this massive wave of attacks targeting VMware ESXi servers with the Nevada ransomware operation.

“According to experts from the ecosystem as well as autorities, they might be related to Nevada ransomware and are using CVE-2021-21974 as compromission vector. Investigation are still ongoing to confirm those assumptions,” OVHcloud CISO Julien Levrard said.

“The attack is primarily targetting ESXi servers in version before 7.0 U3i, apparently through the OpenSLP port (427).”

New ESXiArgs ransomware

However, from the ransom notes seen in this attack, they do not appear to be related to the Nevada Ransomware, and appears to be a new ransomware family.

Starting roughly four hours ago, victims impacted by this campaign have also begun reporting the attacks on BleepingComputer’s forum, asking for help and more information on how to recover their data.

The ransomware encrypts files with the .vmxf, .vmx, .vmsd, and .nvram extensions on compromised ESXi servers and creates a .args file for each encrypted document with metadata (likely needed for decryption).

Victims have found ransom notes named “ransom.html” and “How to Restore Your Files.html” on locked systems. Others said that their notes are plaintext files.

ESXiArgs ransom note
ESXiArgs ransom note (BleepingComputer)

ID Ransomware‘s Michael Gillespie is currently tracking the ransomware under the name ‘ESXiArgs,’ but told BleepingComputer that until we can find a sample, there is no way to determine if it has any weaknesses in the encryption.

BleepingComputer has a dedicated support topic where people are reporting their experiences with this attack. 

If you have new information or a copy of the malware, please let us know so researchers can analyze it for weaknesses.

This is a developing story and will be updated with new info as it becomes available …

Share55Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

March 12, 2023
CISA releases recovery script for ESXiArgs ransomware victims

CISA warns of actively exploited Plex bug after LastPass breach

March 11, 2023
T-Mobile says hackers stole data on 37 million customers

T-Mobile hacked to steal data of 37 million accounts in API data breach

January 19, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Toncoin [TON] climbs into resistance zone, but momentum favored the bulls
  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?