Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: TargetCompany Ransomware Targets VMware ESXi with Linux Variant
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

TargetCompany Ransomware Targets VMware ESXi with Linux Variant

Highlights

  • TargetCompany's Linux variant targets VMware ESXi environments.

  • Ransomware employs shell scripts for payload delivery and execution.

  • Organizations must enhance cybersecurity measures to mitigate threats.

Kaan Demirel
Last updated: 5 June, 2024 - 2:45 pm 2:45 pm
Kaan Demirel 11 months ago
Share
SHARE

The TargetCompany ransomware group has recently expanded its arsenal by introducing a sophisticated Linux variant aimed at VMware ESXi environments. This shift signifies an alarming evolution in ransomware tactics, emphasizing the group’s relentless efforts to breach critical virtualized infrastructures. With organizations increasingly relying on virtualization technologies, the implications of these attacks are far-reaching and necessitate heightened cybersecurity measures.

Contents
Linux Variant: A New ThreatInfrastructure and Affiliate ActivityKey Takeaways

VMware ESXi is a type-1 hypervisor that allows multiple virtual machines to share the same hardware resources without interfering with each other. Launched in October 2008, VMware ESXi was developed by VMware and is known for its efficiency and small footprint. It operates directly on server hardware, providing a robust platform for virtualization that is widely deployed in data centers around the world.

Reports from June 2021 revealed that TargetCompany ransomware, also known as “Water Gatpanapun” by Trend Micro and “Mallox” on its leak site, has been targeting firms in Taiwan, India, Thailand, and South Korea. This group has consistently updated its techniques to evade security measures, including employing PowerShell scripts to bypass the Antimalware Scan Interface (AMSI) and using fully undetectable (FUD) obfuscator packers. Combining these methods with their new focus on Linux environments marks a significant shift in their strategy.

Linux Variant: A New Threat

Trend Micro’s threat-hunting team recently discovered that TargetCompany has developed a new ransomware variant targeting Linux systems. This version uses a shell script for payload delivery and execution, diverging from previous methods. This adaptation reflects a broader trend where ransomware groups are increasingly targeting critical Linux environments, thereby expanding their range of potential victims.

The Linux variant ensures it has administrative rights before proceeding with its malicious operations. Upon execution, it creates a text file named TargetInfo.txt containing victim details, which it sends to a command-and-control (C&C) server. The attack method bears resemblance to the group’s Windows variant, highlighting a consistent strategy across different operating systems.

Infrastructure and Affiliate Activity

TargetCompany’s broadened focus on virtualization servers, particularly VMware ESXi environments, aims to cause significant disruption and increase the likelihood of ransom payments. The ransomware checks if the system is running a VMware ESXi environment by executing the “uname” command and looking for the “vmkernel” identifier. It then encrypts files, appending the “.locked” extension and leaving a ransom note named HOW TO DECRYPT.txt. The payload is delivered through a custom shell script that ensures the malware is executable and runs in the background, also providing redundancy for data exfiltration.

Key Takeaways

– The new Linux variant represents a critical escalation in ransomware capabilities targeting virtualized infrastructure.
– The ransomware group employs sophisticated techniques such as shell scripts for payload delivery and execution.
– Organizations must adopt robust cybersecurity measures, including multifactor authentication, regular patching, and the 3-2-1 backup rule.

The emergence of TargetCompany’s Linux variant underscores the evolving nature of ransomware threats. This group’s expanded focus on ESXi environments signifies an alarming trend that demands immediate and comprehensive cybersecurity responses. Organizations must stay vigilant, employing best practices and continuously updating their defenses to mitigate these threats. Understanding the tactics used by ransomware groups and implementing robust security measures can help organizations protect their critical infrastructure from such sophisticated attacks.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Development of a Highly Adaptive Miniature Piezoelectric Robot Inspired by Earthworms
Next Article FBI Issues Alert on Rising Work-From-Home Scams

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
Tesla Brings Robotaxi to Saudi Arabia as Global Expansion Continues
Electric Vehicle
Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?