Cyber Security

Attackers Encrypt VMware ESXi Server With Python Ransomware

A just lately noticed assault employed a Python-based ransomware variant to focus on a corporation’s VMware ESXi server and encrypt all digital disks, Sophos reviews.

The attack concerned using a customized Python script that, as soon as executed on the goal group’s digital machine hypervisor, took all VMs offline.

The attackers, Sophos’ safety researchers clarify, have been slightly fast to execute the ransomware: the encryption course of began roughly three hours after preliminary compromise.

For preliminary entry, the attackers compromised a TeamViewer account that didn’t have multi-factor authentication arrange, and which was working within the background on a pc belonging to a consumer that had Area Administrator credentials.

The attackers waited half-hour previous midnight within the group’s time zone to log in, then downloaded and executed a instrument to determine targets on the community, which allowed them to discover a VMware ESXi server, Sophos explains.

At round 2am, the attackers fetched an SSH consumer to log into the server, leveraging the built-in SSH service ESXi Shell that may be enabled on ESXi servers for administration functions.

Three hours after the community was first scanned, the attackers logged into the ESXi Shell, copied the Python script, after which executed it for every datastore disk quantity, thus encrypting the digital disk and settings recordsdata for digital machines.

The script is simply 6kb in measurement, however permits attackers to configure it with a number of encryption keys, in addition to with varied e mail addresses and with the file suffix to be appended to encrypted recordsdata.

Based on Sophos, the script comprises a number of hardcoded encryption keys, and a routine for producing much more keys, which led the researchers to the conclusion that the ransomware creates a singular key at every run.

Thus, on this specific assault, as a result of the attackers executed the script individually for every of the three focused ESXi datastores, a brand new key was created for every encryption course of. The script doesn’t transmit the keys however as a substitute writes them to the filesystem, encrypted with the hardcoded public key.

“Python is pre-installed on Linux-based techniques similar to ESXi, and this makes Python-based assaults potential on such techniques. ESXi servers signify a beautiful goal for ransomware risk actors as a result of they will assault a number of digital machines directly, the place every of the digital machines could possibly be working business-critical functions or companies,” Andrew Brandt, principal researcher at Sophos, stated.

Associated: Colossus Ransomware Hits Automotive Company in the U.S.

Associated: Links Found Between MSHTML Zero-Day Attacks and Ransomware Operations

view counter

Ionut Arghire is a world correspondent for SecurityWeek.

Earlier Columns by Ionut Arghire:

Source link