Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: RansomHub Targets ESXi Systems with New Linux Variant
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

RansomHub Targets ESXi Systems with New Linux Variant

Highlights

  • RansomHub targets ESXi systems with a new Linux variant.

  • 90% commission rate attracts experienced affiliates, causing rapid spread.

  • Organizations need multi-layered defense to counter evolving ransomware threats.

Samantha Reed
Last updated: 21 June, 2024 - 4:46 pm 4:46 pm
Samantha Reed 11 months ago
Share
SHARE

Recent discoveries by Recorded Future indicate a new Linux variant of RansomHub actively targeting ESXi systems. With the increasing prevalence of virtualized infrastructure in enterprise environments, ESXi systems present an attractive target for cybercriminals. This latest development underlines the importance for organizations to bolster their security measures to mitigate the impact of such attacks.

Contents
RansomHub Attacking ESXi SystemsMitigations

RansomHub Attacking ESXi Systems

RansomHub, a Ransomware-as-a-Service (RaaS) platform, has been operational since February 2024. It deploys malware written in Go and C++ across various operating systems, including Windows, Linux, and ESXi. The platform’s lucrative 90% commission rate attracts experienced affiliates, leading to 45 reported victims in IT departments across 18 countries.

Links have been identified between RansomHub’s malware and the codes of ALPHV and Knight Ransomware, suggesting potential affiliations. Organizations are urged to implement both immediate and long-term security strategies to counter this emerging threat.

In an example of their methods, RansomHub affiliates exploited misconfigured Amazon S3 instances to infiltrate clients’ backups. They then engaged in extortion, leveraging the stolen data to pressure backup providers into purchasing the compromised information. This strategy exploits the trust between providers and clients, highlighting the sophisticated nature of these attacks.

Mitigations

Several mitigation strategies are recommended to defend against such ransomware attacks. Segmenting the network can limit lateral movement, while SIEM systems are useful for centralized logging and detection. Furthermore, implementing EDR with YARA/Sigma rules, enforcing least privilege and multi-factor authentication for remote access, and maintaining regular offline and isolated data backups are crucial steps. Ongoing system audits and keeping systems patched and updated are also vital. Utilizing YARA, Sigma, and Snort rules for malware detection can further enhance security.

This latest attack vector was highlighted by the Insikt Group, which confirmed RansomHub’s similarities with ALPHV (BlackCat) and Knight Ransomware based on code analysis. They also noted that RansomHub employs encrypted file password settings to hinder analysis. As a potential mitigation, altering the /tmp/app.pid file used by the ESXi version of the ransomware could prevent it from functioning, as it only allows one instance of the ransomware at a time.

Since RansomHub’s emergence, the frequency of cross-platform attacks has dramatically increased, with a sevenfold rise between 2022 and 2023. This trend emphasizes the need for robust cybersecurity measures to protect against the rising number of multi-OS threats. The detailed report on this issue can be found on Cyber Security News.

Comparing recent information to previous reports, RansomHub’s tactics seem consistent with other high-profile ransomware groups. The use of high commission rates to attract affiliates and targeting high-value victims for substantial ransoms are common strategies within the ransomware ecosystem. This aligns with previously observed behaviors by groups like ALPHV and Knight Ransomware, reinforcing the need for vigilance and advanced defense mechanisms.

In contrast to earlier ransomware campaigns, RansomHub’s focus on exploiting virtualized infrastructure and backup systems showcases an evolution in cyberattack strategies. This shift highlights the increasing sophistication of ransomware operations, requiring organizations to adopt more comprehensive and adaptive security approaches to stay ahead of potential threats.

Organizations facing threats from ransomware like RansomHub should prioritize a multi-layered security approach. By implementing segmentation, centralized logging, EDR systems, and regular backups, they can significantly reduce the risk and impact of such attacks. Additionally, continuous system audits and timely updates are essential to maintain a robust security posture. Given the evolving nature of ransomware tactics, staying informed and proactive is crucial for safeguarding digital assets.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

MITRE’s CVE Program Faces Funding Shake-up and Future Alternatives

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Apple Innovates with Real-Time Video Overlays
Next Article Roborock Unveils Multi-function Robot Vacuum with Mopping Feature

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Upcoming NVIDIA RTX 5060 Pricing Leaked Ahead of Launch
Computing
Tesla Hires Operators to Develop Optimus Robot
Electric Vehicle
Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?