VMware ESXi hypervisors are the goal of a brand new wave of assaults designed to deploy ransomware on compromised techniques.
“These assault campaigns seem to use CVE-2021-21974, for which a patch has been out there since February 23, 2021,” the Pc Emergency Response Crew (CERT) of France mentioned in an advisory on Friday.
VMware, in its personal alert launched on the time, described the problem as an OpenSLP heap-overflow vulnerability that might result in the execution of arbitrary code.
“A malicious actor residing throughout the identical community section as ESXi who has entry to port 427 might be able to set off the heap-overflow difficulty in OpenSLP service leading to distant code execution,” the virtualization providers supplier famous.
French cloud providers supplier OVHcloud mentioned the assaults are being detected globally with a particular concentrate on Europe. It is being suspected that the assaults are associated to a brand new Rust-based ransomware pressure known as Nevada that emerged on the scene in December 2022.
Different ransomware households which can be recognized to have embraced Rust in current months embody BlackCat, Hive, Luna, Nokoyawa, RansomExx, and Agenda.
“The actors are inviting each Russian- and English-speaking associates to collaborate with an enormous variety of Preliminary Entry Brokers (IABs) in [the] darkish internet,” Resecurity mentioned final month.
“Notably, the group behind the Nevada Ransomware can be shopping for compromised entry by themselves, the group has a devoted crew for post-exploitation, and for conducting community intrusions into the targets of curiosity.”
Nonetheless, Bleeping Pc experiences that the ransom notes seen within the assaults bear no similarities to Nevada ransomware, including the pressure is being tracked below the title ESXiArgs.
Customers are really useful to improve to the newest model of ESXi to mitigate potential threats in addition to limit entry to the OpenSLP service to trusted IP addresses.