Ransomware actors have recently exploited a nearly two-year-old vulnerability in the ESXi hypervisor developed by VMware to carry out a massive ransomware campaign dubbed ESXiArgs. They appear to be exploiting CVE-2021-21974, a heap-overflow vulnerability in the OpenSLP service run by ESXi. According to Italy’s National Cybersecurity Agency, while Europe has been hit the hardest, North America has also suffered greatly.

Who warned the world about the new ESXiArgs ransomware?

While France was the first to report the attack, Italy, Finland, the United States, and Canada soon joined the bandwagon. On Feb. 3, 2023, French cloud provider OVHcloud and the French Computer Emergency Response Team (CERT-FR) became aware of and investigated attacks against ESXi hypervisors, which are being targeted by threat actors for the express purpose of deploying ESXiArgs ransomware on them.

The attackers appear to be leveraging CVE-2021-21974 as this allows them to run exploit codes remotely. Though the patches for this vulnerability have been available since February 2021, this attack has demonstrated just how many servers have remained unpatched with the OpenSLP port 427 still exposed.

As the Austrian CERT has noted, Censys data indicates that at least 3,276 systems have been affected. The Austrian CERT also reported that CVE-2019-5544 and CVE-2020-3992 could be possible attack vectors. On Feb. 8, 2023, the US' Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a joint advisory revealing that over 3,800 servers have been compromised globally. The advisory adds that the ransomware encrypts only the configuration files that are associated with the VM files and not the flat files. In some cases, these unencrypted flat files can help organizations reconstruct their encrypted VM files.

Which ESXi versions are vulnerable to the ESXiArgs ransomware?

According to CERT-FR, the VMware ESXi versions that are vulnerable to the new ransomware variant, ESXiArgs, are:

  • Versions 6.x prior to 6.7.
  • Versions 7.x prior to ESXi70U1c-17325551.
  • Versions 6.7.x prior to ESXi670-202102401-SG.
  • Versions 6.5.x prior to ESXi650-202102101-SG.

CISA has reported that attackers are taking advantage of unpatched, out-of-service, or out-of-date versions of the ESXi hypervisors to deploy the Args ransomware.

How does the ESXiArgs ransomware work?

The attack pattern, as identified by OVHcloud, is as follows:

  1. An OpenSLP vulnerability, possibly CVE-2021-21974, and the user dcui (as depicted in the logs) have been identified as part of the compromise process.

  2. The ransomware uses a public key deployed in /tmp/public.pem to encrypt data.

  3. The encryption targets VM files with the extensions VMDK, VMX, VMXF, VMSD, VMSN, VSWP, VMSS, NVRAM, and VMEM.

  4. To unlock the files, the malware then attempts to shut down VMs by killing the VMX process.

  5. The ESXiArgs ransomware then creates args files (by adding the .args extension) that contain the metadata (the number of megabytes to skip, the number of megabytes in the encryption block, and the file size) for each encrypted VM file.

  6. No evidence of exfiltration has been found before file encryption. In some cases, encryption seems to fail partially, which allows for data recovery.

How much ransom is demanded?

Threat intelligence provider DarkFeed shared a copy of a ransom note in which the attackers demand 2.064921 bitcoins. But in each of the notes, the ransom and wallet address are different, as shown in Figure 1 and 2 below.

An ESXiArgs ransom note demanding 2.064921 bitcoinsFigure 1. A ransom note demanding that 2.064921 bitcoins be sent to a wallet address..

An ESXiArgs ransom note demanding 2.01584 bitcoinsFigure 2. A ransom note demanding that 2.01584 bitcoins be sent to a different wallet address..

What are the experts' recommendations for recovery?

Julien Levrard, CISO of OVHcloud, recommends the recovery procedure for VMDK files documented by Turkish security researcher Enes Sönmez as many researchers have found the success rate for Sönmez's procedure to be good. Moreover, CISA has released a script to help organizations recover their encrypted files, which you can find here.

CERT-FR recommends the following measures after the ransomware infection:

  1. Isolate the affected server.

  2. As attackers may have already deposited the malcode, implementing the patches alone might be insufficient. Analyze your systems for any sign of compromise.

  3. Reinstall your hypervisor, preferably ESXi versions 7.x or 8.x.

  4. Apply all the necessary security patches and follow vendor security advisories to remain up to date.

  5. Disable unnecessary services, such as the SLP service, on hypervisors.

  6. Block access to administration services as required (either through a dedicated firewall or through the firewall integrated into the hypervisor) and implement a local administration network and a remote administration capability if required (via VPN or filtering trusted IP addresses).

CISA also recommends maintaining offline backups of your data, ensuring they're encrypted and immutable, and regularly testing your backup and restoration capabilities. CISA further advises organizations to have an incident response plan to combat ransomware attacks.

How can ManageEngine Log360 help combat ransomware?

ManageEngine Log360 is a unified SIEM solution with integrated UEBA, SOAR, DLP, and CASB capabilities that can help you identify, detect, and mitigate various cyberattacks, including ransomware. With Log360, you can:

  • Look for file changes, such as renaming, deletions, modifications, and creations.
  • Audit PowerShell to see what scripts are being executed in your network.
  • Monitor and audit network shares in your organization.
  • Receive alerts for system events associated with ransomware installations.
  • Track suspicious activities on your file servers.
  • Correlate multiple events across the network and identify them as being part of a single incident.

To learn more about how Log360 can help your organization defend against cyberattacks, sign up for a personalized demo.

×
  • Please enter a business email id
     
  • By clicking 'Read the ebook', you agree to processing of personal data according to the Privacy Policy

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

Expert Talks

     
 

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.