Following the discovery of a coding flaw in the ESXiArgs Ransomware, the US government Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a document outlining how to use the various scripts and processes to recovery data after an attack: CISA and FBI Release ESXiArgs Ransomware Recovery Guidance …
ESXiArgs ransomware is a massive problem
ESXiArgs ransomware targets VMware ESXi virtualisation systems – usually used by larger companies, data centres, cloud providers etc, but we have used this software in the past – and exploits a vulnerability that was patched by VMware two years ago. However it appears not everyone has applied the patches. Thousands of …
New ransomware in the wild
A new strain of malware/ransomware has been discovered by the MalwareHunterTeam – who have Tweeted out details and images. The ransomware is being called RedAlert, or N13V, and target Windows and Linux VMWare ESXi servers. New RedAlert Ransomware targets Windows, Linux VMware ESXi servers (bleepingcomputer.com) Double extortion Similar to other …
Ransomware targets VMware
A new malware strain known as Cheerscrypt or Cheers, is targeting a VMware enterprise virtualisation tool – VMware ESXi systems. Ransomware Cheerscrypt targets VMware ESXi systems • The Register