Shutterstock
Hundreds of organisations all over the world have been targeted by a hacking campaign exploiting VMware’s ESXi servers to deploy the new ESXiArgs ransomware variant.
French and Italian cyber security agencies issued an urgent warning final week following attackers have been located to be actively targeting servers still left unpatched in opposition to a two-year-outdated distant code execution (RCE) vulnerability.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Tracked as CVE-2021-21974, the security flaw is triggered by a heap overflow issue in the OpenSLP support and can permit an attacker to remotely execute arbitrary code.
VMware verified it is conscious of exploit reports, incorporating that it issued a patch in February 2021 on discovery of the vulnerability. Nonetheless, the seller urged prospects to immediately implement the patch if the ESXi hypervisor has not nonetheless been current.
Widespread exploitation
Evaluation from ransomware checking service Darkfeed found that the unfold of the ESXiArgs ransomware is “extensive” and could have affected at the very least 327 organisations all over the world.
“The most focused system is from France on OVH cloud and Hetzner hosting,” the support reported on Twitter. “But they have strike other hosting and cloud organizations all-around that globe.”
In a assertion on 3 February, OVH confirmed it was responding to the wave of attacks, introducing that its managed cloud services experienced not been impacted.
“A wave of attacks is at the moment focusing on ESXi servers,” the business claimed. “No OVHcloud managed services are impacted by this attack however, considering that a lot of clients are employing this running process on their own servers, we present this post as a reference in assist to support them in their remediation.”
Royal ransomware
Preliminary speculation from OVH advised that this marketing campaign was associated to the new Nevada ransomware strain, which initial emerged in December last 12 months.
On the other hand, reports around the weekend pointed in the direction of the Royal Ransomware strain as a essential driver driving the wave of attacks against ESXi digital equipment.
Royal Ransomware began launching attacks in early 2022, with the group designed up of preceding veterans of the notorious Conti ransomware gang.
The team has accelerated functions in current months, focusing attacks on US-dependent healthcare organisations and precisely focusing on Linux techniques extra recently.
Stefan van der Wal, consulting remedies engineer at Barracuda Networks said that the existing marketing campaign highlights the critical risk for organisations failing to update computer software.
“The noted common ransomware attacks versus unpatched VMware EXSi methods in Europe and somewhere else seem to have exploited a vulnerability for which a patch was built obtainable in 2021,” he said.
“This highlights how essential it is to update crucial software package infrastructure devices as swiftly as attainable.
“It isn’t always easy for organisations to update software. In the scenario of this patch, for illustration, organisations need to disable temporarily crucial areas of their IT infrastructure. But it is much greater to experience that than to be strike by a perhaps harmful attack.”
Van der Wal added that virtual equipment are getting an ever more appealing goal for ransomware gangs owing to their use in jogging organization-critical services and features.
“Securing digital infrastructure is vital,” he explained. “It is particularly crucial to be certain that accessibility to a digital system’s management console is secured and just cannot be conveniently accessed by a compromised account on the corporate network, for case in point.”
Some sections of this post are sourced from:
www.itpro.co.uk