• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Legacy VMware Bug Exploited in Global Ransomware Campaign

You are here: Home / General Cyber Security News / Legacy VMware Bug Exploited in Global Ransomware Campaign
February 6, 2023

VMware clients are being urged to patch a vulnerability on their ESXi hypervisors to start with disclosed in 2021, in purchase to mitigate the affect of an ongoing ransomware marketing campaign.

Governing administration cybersecurity authorities in France, Singapore and in other places have sounded the alarm following experiences emerged of servers becoming compromised in Italy, France, Finland, the US and Canada.

Reuters documented dozens of servers in Italy as compromised, but the accurate scale of the global threat is nonetheless unfamiliar. A Shodan look for from dark web intelligence vendor DarkFeed revealed above 300 victims, whilst even this is likely to be the suggestion of the iceberg.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Both equally the US Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s Nationwide Cyber Security Centre (NCSC) appear to be informed of the marketing campaign but had not unveiled any official assertion at the time of creating.

The vulnerability in concern, CVE-2021-21974, permits attackers to complete distant code execution by triggering a heap-overflow issue in OpenSLP.

It impacts the pursuing ESXi variations:

  • ESXi variations 7.x previously than ESXi70U1c-17325551
  • ESXi versions 6.7.x earlier than ESXi670-202102401-SG
  • ESXi versions 6.5.x earlier than ESXi650-202102101-SG

“Users and directors of impacted solution variations are advised to enhance to the newest versions straight away,” urged the Singapore Laptop or computer Emergency Response Team (SingCERT).

“As a precaution, a full program scan should also be executed to detect any symptoms of compromise. Customers and administrators are also recommended to evaluate if the ransomware marketing campaign-targeted port 427 can be disabled without having disrupting operations.”

The CERT also revealed the IP addresses related with the ransomware actors, so that administrators can update firewall guidelines to block them.

The SLP can be disabled on any ESXi servers that haven’t been up to date, in get to even further mitigate the risk of compromise, the French CERT (CERT-FR) added.

The identity of the group behind the campaign is at the moment unfamiliar, even though DarkFeed reported every Bictoin wallet offered to victims for payment is distinctive. There’s no leak site linked to the team, only a Tox messaging application ID to contact.

Editorial credit icon picture: Pavel Kapysh / Shutterstock.com


Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «saas in the real world: who's responsible to secure this SaaS in the Real World: Who’s Responsible to Secure this Data?
Next Post: Stalkerware Developer Hit with $400K Fine Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.