Advertisement Banner
  • Home
  • News
  • Cyber News
  • Contact
No Result
View All Result
  • Home
  • News
  • Cyber News
  • Contact
No Result
View All Result
Wellnessnewshubb
No Result
View All Result
Home Cyber News

Global ransomware spree infects unpatched VMWare servers. CISA has a fix.

admin by admin
February 8, 2023
in Cyber News


The Cybersecurity and Infrastructure Security Agency released a script Tuesday night to help organizations attempting to recover virtual machines affected by a spree of global cyberattacks targeting VMware ESXi servers.

The so-called ESXiArgs ransomware variant has been reported by some firms to take advantage of two-year-old vulnerability that attackers are able to remotely exploit. Last weekend, the attacks prompted warnings from several European cybersecurity authorities to quickly patch the OpenSLP bug.

It’s unclear how widespread the campaign is and who is behind it, however, France’s CERT-FR said that they became aware of the campaign starting on Feb. 3. The Austrian CERT noted that they saw at least 3,276 systems impacted worldwide using scans from Censys, a firm that indexes internet-connected devices.

The script released Tuesday is at least partially based on a recovery tutorial by cybersecurity researchers Enes Sonmez and Ahmet Aykac. It reconstructs VM metadata from virtual disks not encrypted by the ransomware.

🚨We released an ESXiArgs ransomware recovery script on GitHub to allow organizations to attempt recovery of virtual machines affected by the ESXiArgs ransomware attacks: https://t.co/cXpP1m03yw #StopRansomware

— Cybersecurity and Infrastructure Security Agency (@CISAgov) February 7, 2023

However, CISA also warned that they are not going to assume any liability for damage caused by the script. “While CISA works to ensure that scripts like this one are safe and effective, this script is delivered without warranty, either implicit or explicit,” CISA wrote.

In an emailed statement, a CISA spokesperson said that the agency “is working with our public and private sector partners to assess the impacts of these reported incidents and providing assistance where needed. Any organization experiencing a cybersecurity incident should immediately report it to CISA or the FBI.”

CISA did not respond to request for comment on how widespread the ESXiArg campaign may be in the U.S.

Cybersecurity firm GreyNoise, however, noted in a report released Wednesday that the vulnerability that cybersecurity firms are pointing to as the culprit for the global ransomware campaign may not be the actual access point.

“We do not currently know what the initial access vector is, and it is possible it could be any of the vulnerabilities related to ESXi’s OpenSLP service,” the report said.

GreyNoise points out other vulnerabilities in OpenSLP that could be the initial access point and notes that none of the reports describing the campaign are first-party sources.

Updated Feb. 8, 2023: This article has been updated to include comment from CISA and additional information from GreyNoise.





Source link

Previous Post

VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacksSecurity Affairs

Next Post

Leader From Taiwan’s KMT Starts China Trip as Beijing Ups Pressure – The Diplomat

Next Post

Leader From Taiwan’s KMT Starts China Trip as Beijing Ups Pressure – The Diplomat

Recommended

Hong Kong may face backlog in crypto license applications as demand grows, former SFC regulator says

13 hours ago

It’s time to focus on information warfare’s hard questions

3 months ago

© 2022 Law Enforcement News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Cyber News
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • News
  • Cyber News
  • Contact

© 2022 Law Enforcement News Hubb All rights reserved.