UPDATED 09:00 EST / OCTOBER 05 2021

SECURITY

New Python ransomware targets virtual machines hosted on ESXi hypervisor

Researchers at Sophos Group plc have released details of new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor.

The ransomware attack was first discovered at 12:30 a.m. on Sunday when those behind the attack broke into a TeamViewer account running on a computer that belonged to a user who also had domain administrator access credentials. Ten minutes later, the attackers used the Advanced IP Scanner tool to look for targets on the network.

The researchers believe the ESXi Server on the network was vulnerable because it had an active Shell programming interface used for commands and updates. That allowed the attackers to install a secure network communications tool called Bitvise on the machine belonging to the domain administrator, which gave them remote access to the ESXi system, including the virtual disk files used by the virtual machines.

By 3:40 a.m., the attackers deployed the ransomware and encrypted the virtual hard drives hosted on the ESXi server.

“This is one of the fastest ransomware attacks Sophos has ever investigated and it appeared to precision-target the ESXi platform,” explained Andrew Brandt, a principal researcher at Sophos. “Python is a coding language not commonly used for ransomware. However, Python is pre-installed on Linux-based systems such as ESXi, and this makes Python-based attacks possible on such systems.”

Brandt further noted that ESXi servers represent an attractive target for ransomware threat actors because they can attack multiple virtual machines at once, and each of the virtual machines could be running business-critical applications or services.

“Attacks on hypervisors can be both fast and highly disruptive,” Brandt added. “Ransomware operators including DarkSide and REvil have targeted ESXi servers in attacks.”

The researchers noted that administrators who operate ESXi or other hypervisors on their networks should follow security best practices. Recommended practices include using unique, difficult-to-brute-force passwords and enforcing the use of multifactor authentication wherever possible. In addition, the ESXi Shell can and should be disabled whenever it’s not being used by staff for routine maintenance.

Photo: Unsplash

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.