{"id":21805,"date":"2023-04-24T09:01:12","date_gmt":"2023-04-24T17:01:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15536\/"},"modified":"2023-04-24T09:01:12","modified_gmt":"2023-04-24T17:01:12","slug":"news-15536","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15536\/","title":{"rendered":"New ransomware groups target VMWare and Linux | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/04\/21084046\/linux-vmware-esxi-ransomware-attacks-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Fri, 21 Apr 2023 12:52:47 +0000<\/strong><\/p>\n<p>Ransomware. Nasty. But how to build defenses against it? Rather \u2013 what should be protected first and foremost? Often, Windows workstations, Active Directory servers, and other Microsoft products are the prime candidates. And this approach is usually justified. But we should bear in mind that cybercriminal tactics are constantly evolving, and malicious tools are now being <a href=\"https:\/\/securelist.com\/new-ransomware-trends-in-2022\/106457\/\" target=\"_blank\" rel=\"noopener\">developed for Linux servers<\/a> and virtualization systems. In 2022, the total number of attacks on Linux systems <a href=\"https:\/\/www.zdnet.com\/article\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/\" target=\"_blank\" rel=\"nofollow noopener\">increased by about 75%<\/a>.<\/p>\n<p>The motivation behind such attacks is clear: the popularity of open source and virtualization is growing, which means there are more and more servers running Linux or VMWare ESXi. These often store a lot of critical information which, if encrypted, can instantly cripple a company&#8217;s operations. And since the security of Windows systems has traditionally been the focus of attention, non-Windows servers are proving to be sitting ducks.<\/p>\n<h2>Attacks in 2022\u20132023<\/h2>\n<ul>\n<li>In February 2023, many owners of VMware ESXi servers were hit by the <a href=\"https:\/\/t.me\/kasperskyb2b\/448\" target=\"_blank\" rel=\"nofollow noopener\">ESXiArgs ransomware<\/a> Exploiting the CVE-2021-21974 vulnerability, attackers disabled virtual machines and encrypted .vmxf, .vmx, .vmdk, .vmsd and .nvram files.<\/li>\n<li>The infamous Clop gang \u2014 noted for a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">large-scale attack<\/a> on vulnerable Fortra GoAnywhere file-transfer services through <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-0669\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-0669<\/a> \u2014 was spotted in December 2022 using (albeit in a limited way) a Linux version of its ransomware. It differs significantly from its Windows counterpart (lacking some optimizations and defensive tricks), but is adapted to Linux permissions and user types and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-flaw-allowed-linux-victims-to-recover-files-for-months\/\" target=\"_blank\" rel=\"nofollow noopener\">specifically targets Oracle database folders<\/a>.<\/li>\n<li>A new version of the <a href=\"https:\/\/securelist.com\/luna-black-basta-ransomware\/106950\/\" target=\"_blank\" rel=\"noopener\">BlackBasta ransomware<\/a> is designed specially for attacks on ESXi hypervisors. The encryption scheme uses the ChaCha20 algorithm in multi-threaded mode involving multiple processors. Since ESXi farms are typically multiprocessor, this algorithm minimizes the time taken to encrypt the entire environment.<\/li>\n<li>Shortly before its breakup, the Conti group of hackers also armed itself with ESXi-targeting ransomware. Unfortunately, given that much of Conti&#8217;s code was leaked, their developments are now available to a broad range of cybercriminals.<\/li>\n<li>The BlackCat ransomware, written in Rust, is also capable of disabling and deleting ESXi virtual machines. In other respects, the malicious code differs little from the Windows version.<\/li>\n<li>The <a href=\"https:\/\/www.kaspersky.com\/blog\/luna-blackbasta-ransomware\/44900\/\" target=\"_blank\" rel=\"noopener\">Luna ransomware<\/a>, which we detected in 2022, was cross-platform to begin with, able to run on Windows, Linux and ESXi systems. And, of course, the <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-ransomware-is-now-targeting-linux-servers-too\/\" target=\"_blank\" rel=\"nofollow noopener\">LockBit<\/a> group could hardly fail to ignore the trend: it too began to offer ESXi versions of their malware to affiliates.<\/li>\n<li>As for older (but, alas, effective) attacks, there were also the RansomEXX and QNAPCrypt campaigns, which <a href=\"https:\/\/www.kaspersky.com\/blog\/linux-security-hybrid-cloud\/41259\/\" target=\"_blank\" rel=\"noopener\">hit Linux servers<\/a> big-time.<\/li>\n<\/ul>\n<h2>Server-attack tactics<\/h2>\n<p>Penetrating Linux servers is usually based on exploitation of vulnerabilities. Attackers can weaponize vulnerabilities in the operating system, web servers and other basic applications, as well as in business applications, databases, and virtualization systems. As <a href=\"https:\/\/www.kaspersky.com\/blog\/log4shell-critical-vulnerability-in-apache-log4j\/43124\/\" target=\"_blank\" rel=\"noopener\">demonstrated last year by Log4Shell<\/a>, vulnerabilities in open-source components require special attention. After an initial breach, many ransomware strains use additional tricks or vulnerabilities to elevate privileges and encrypt the system.<\/p>\n<h2>Priority safeguards for Linux servers<\/h2>\n<p>To minimize the chances of attacks affecting Linux servers, we recommend:<\/p>\n<ul>\n<li>Promptly patching vulnerabilities<\/li>\n<li>Minimizing the number of open internet-facing ports and connections<\/li>\n<li>Deploying <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cloud-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____khcs___\" target=\"_blank\">specialized security tools<\/a> on servers to protect both the operating system itself as well as virtual machines and containers hosted on the server. <a href=\"https:\/\/www.kaspersky.com\/blog\/linux-security-hybrid-cloud\/41259\/\" target=\"_blank\" rel=\"noopener\">Read more about Linux protection in our dedicated post<\/a>.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\" \/><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"37702\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/linux-vmware-esxi-ransomware-attacks\/47988\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/04\/21084046\/linux-vmware-esxi-ransomware-attacks-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Fri, 21 Apr 2023 12:52:47 +0000<\/strong><\/p>\n<p>What methods are used to attack VMWare and Linux servers, and how to guard against ransomware.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,12177,26503,10496,3765,1331,10438,14138],"class_list":["post-21805","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-enterprise","tag-esxi","tag-linux","tag-ransomware","tag-technology","tag-threats","tag-vmware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21805"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21805\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21805"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}