ESXi Ransomware: Trends, Logging, and Detection | Threat SnapShot
Since 2021, ransomware groups have set their sights on VMware ESXi hypervisors, with the SEXi variant, emerging in 2024, being the most recent threat. The Babuk Locker was one of the first to target ESXi, and its leaked source code enabled other strains like ESXiArgs, BlackBasta, and Clop to develop customized variants terminating VMs and encrypting data on ESXi servers. While employing similar tactics like exploiting vulnerabilities and encrypting VM files, these ESXi-focused ransomware exhibit patterns that provide detection opportunities across the board. By analyzing past attacks, we can better prepare for future threats targeting our virtualization environments. Join the SnapAttack community to access in-depth detection content covered in this video and stay ahead of evolving ransomware targeting ESXi.
✅ *Subscribe to SnapAttack for more in-depth analyses and real-world applications of cybersecurity defenses.*
📢 *Have questions or topics you’d like us to cover? Drop a comment below!*
👋 *Follow us:*
https://www.linkedin.com/company/snapattack/
https://twitter.com/snapattackhq
https://www.linkedin.com/in/ajkingio/
https://twitter.com/ajkingio
SnapAttack Resources:
- https://app.snapattack.com/collection/0fca0882-6752-4536-ae82-51feaad9a53d - Collection: ESXi Ransomware: Trends, Logging, and Detection | Threat SnapShot
References:
- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-832A2618-6B11-4A28-9672-93296DA931D0.html
- https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-9F67DB52-F469-451F-B6C8-DAE8D95976E7.html
- https://detect.fyi/detecting-and-responding-to-esxi-compromise-with-splunk-f33998ce7823
- https://www.recordedfuture.com/in-before-the-lock-esxi
- https://blogs.juniper.net/en-us/threat-research/a-custom-python-backdoor-for-vmware-esxi-servers
- https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
- https://www.uptycs.com/blog/rtm-locker-ransomware-as-a-service-raas-linux
- https://www.trendmicro.com/en_us/research/23/b/royal-ransomware-expands-attacks-by-targeting-linux-esxi-servers.html
- https://www.darkreading.com/threat-intelligence/sexi-ransomware-desires-vmware-hypervisors
- https://heimdalsecurity.com/blog/powerhosts-esxi-servers-encrypted-with-new-sexi-ransomware/
- https://bdrsuite.medium.com/the-new-sexi-ransomware-targets-vmware-esxi-servers-what-you-need-to-know-601e2f54c1dc
- https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html
- https://blogs.vmware.com/security/2022/10/esxi-targeting-ransomware-tactics-and-techniques-part-2.html
- https://www.fortinet.com/blog/threat-research/ransomware-roundup-black-basta
- https://ransomware.org/blog/black-basta-ransomware-targets-vmware-servers/
- https://www.uptycs.com/blog/black-basta-ransomware-goes-cross-platform-now-targets-esxi-systems
- https://www.malwarebytes.com/blog/news/2022/06/blackbasta-is-the-latest-ransomware-to-target-esxi-virtual-machines-on-linux
- https://trustedsec.com/blog/esxiargs-what-you-need-to-know-and-how-to-protect-your-data
- https://www.trellix.com/blogs/research/global-esxiargs-ransomware-attack-on-the-back-of-a-two-year-old-vulnerability/
- https://censys.com/the-evolution-of-esxiargs-ransomware/
- https://www.cisa.gov/news-events/alerts/2023/02/07/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance
- https://blogs.blackberry.com/en/2023/02/esxiargs-ransomware-knocking-out-unpatched-vmware-esxi-linux-servers-worldwide
- https://www.cybersecuritydive.com/news/esxiargs-ransomware-vmware/642833/
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a
- https://readwise.io/reader/document_raw_content/172048557
- https://www.forescout.com/blog/vmware-esxi-servers-a-major-attack-vector-for-ransomware/
- https://www.kaspersky.com/blog/linux-vmware-esxi-ransomware-attacks/47988/
- https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
- https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware/
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/