ESXi Ransomware Update Outfoxes CISA Recovery Script

Just
a
week
after
the
Cybersecurity
and
Infrastructure
Security
Agency
(CISA)
released
its

ESXi Ransomware Update Outfoxes CISA Recovery Script

Just
a
week
after
the
Cybersecurity
and
Infrastructure
Security
Agency
(CISA)
released
its

recovery
script
against
ransomware

targeting
VMWare
ESXi
virtual
machines,
a
modified
version
of
the
malware
is
already
in
circulation
that
renders
the
decryptor
script
useless.


So
far,
around
3,800
servers
across
the
globe
have
already
fallen
victim
to

EXSiArgs
ransomware
,
CISA
and
the
FBI
warn.

“Where
the
old
encryption
routine
skipped
large
chunks
of
data
based
on
the
size
of
the
file,
the
new
encryption
routine
only
skips
small
(1MB)
pieces
and
then
encrypts
the
next
1MB,”
researchers
at
Malwarebytes
said
in
a
new

report

on
the

ESXi
vulnerability
.
“This
ensures
that
all
files
larger
than
128MB
are
encrypted
for
50%.
Files
under
128MB
are
fully
encrypted
which
was
also
the
case
in
the
old
variant.”


Targets
of
ESXi-Args
ransomware

can
tell
if
they
are
infected
with
the
new
variant
if
the
ransom
note
directs
the
victim
to
contact
the
threat
actor
via
the
TOX
encrypted
messenger,
the
report
added.
The
ransom
note
from
the
old
ESXiArgs
variant
that
can
be
mitigated
by
the
CISA-issued
decryptor
includes
a
Bitcoin
address.

Keep
up
with
the
latest
cybersecurity
threats,
newly-discovered
vulnerabilities,
data
breach
information,
and
emerging
trends.
Delivered
daily
or
weekly
right
to
your
email
inbox.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.