{"id":18164,"date":"2021-03-26T22:34:48","date_gmt":"2021-03-26T18:34:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-in-virtual-environment\/18164\/"},"modified":"2021-03-26T22:34:48","modified_gmt":"2021-03-26T18:34:48","slug":"ransomware-in-virtual-environment","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-in-virtual-environment\/18164\/","title":{"rendered":"Ransomware in a virtual environment"},"content":{"rendered":"<p>Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still hit virtual infrastructure, as <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gangs-are-abusing-vmware-esxi-exploits-to-encrypt-virtual-hard-disks\/\" target=\"_blank\" rel=\"nofollow noopener\">ZDNet<\/a> reported recently, for example through vulnerable versions of VMware ESXi,<\/p>\n<p>Using virtual machines is a strong and safe practice. For example, using a VM can mitigate the harm of an infection if the virtual machine holds no sensitive data. Even if the user accidentally activates a Trojan on a virtual machine, simply mounting a fresh image of the virtual machine reverses any malicious changes.<\/p>\n<p>However, <a href=\"https:\/\/securelist.com\/ransomexx-trojan-attacks-linux-systems\/99279\/\" target=\"_blank\" rel=\"noopener\">RansomExx<\/a> ransomware specifically targets vulnerabilities in VMware ESXi to attack virtual hard disks. The Darkside group is reported to use the same method, and the creators of the BabukLocker Trojan <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1354237766285012992?s=20\" target=\"_blank\" rel=\"nofollow noopener\">hint<\/a> at being able to encrypt ESXi.<\/p>\n<h2>What are the vulnerabilities?<\/h2>\n<p>The VMware ESXi hypervisor lets multiple virtual machines store information on a single server through Open SLP (Service Layer Protocol), which can, among other things, detect network devices without preconfiguration. The two vulnerabilities in question are <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2019-0022.html\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2019-5544<\/a> and <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2020-0023.html\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2020-3992<\/a>, both old-timers and thus not new to cybercriminals. The first is used to carry out <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/heap-overflow-attack\/\" target=\"_blank\" rel=\"noopener\">heap overflow attack<\/a>s, and the second is of the type <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/use-after-free\/\" target=\"_blank\" rel=\"noopener\">Use-After-Free<\/a> \u2014 that is, related to the incorrect use of dynamic memory during operation.<\/p>\n<p>Both vulnerabilities were closed a while ago (the first in 2019, the second in 2020), but in 2021, criminals are still conducting successful attacks through them.\u00a0 As usual, that means some organizations haven\u2019t updated their software.<\/p>\n<h2>How malefactors exploit ESXi vulnerabilities<\/h2>\n<p>Attackers can use the vulnerabilities to generate malicious SLP requests and compromise data storage. To encrypt information they first need, of course, to penetrate the network and gain a foothold there. That\u2019s not a huge problem, especially if the virtual machine isn\u2019t running a security solution.<\/p>\n<p>To get entrenched in the system, RansomExx operators can, for example, use the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/cve-2020-1472-domain-controller-vulnerability\/37048\/\" target=\"_blank\" rel=\"noopener nofollow\">Zerologon<\/a>\u00a0vulnerability (in the Netlogon Remote Protocol). That is, they trick a user into running malicious code on the virtual machine, then seize control of the Active Directory controller, and only then encrypt the storage, leaving behind a ransom note.<\/p>\n<p>Incidentally, Zerologon is not the only option, just one of the most dangerous options because its exploitation is almost impossible to detect without <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">special services<\/a>.<\/p>\n<h2>How to stay protected from attacks on MSXI<\/h2>\n<ul>\n<li>Update VMware ESXi;<\/li>\n<li>Use VMware\u2019s suggested <a href=\"https:\/\/kb.vmware.com\/s\/article\/76372\" target=\"_blank\" rel=\"nofollow noopener\">workaround<\/a> if updating is absolutely impossible (but bear in mind this method will limit some SLP features);<\/li>\n<li>Update Microsoft Netlogon to patch that vulnerability as well;<\/li>\n<li>Protect all machines on the network, including virtual ones;<\/li>\n<li>Use <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response<\/a>, which detects even complex multistage attacks that are not visible to conventional antivirus solutions.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.<\/p>\n","protected":false},"author":2581,"featured_media":18165,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[433,2432],"class_list":{"0":"post-18164","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-ransomware","11":"tag-vmware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-in-virtual-environment\/18164\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-in-virtual-environment\/22680\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-in-virtual-environment\/9013\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-in-virtual-environment\/24467\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-in-virtual-environment\/22491\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-in-virtual-environment\/21527\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-in-virtual-environment\/24993\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-in-virtual-environment\/24285\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-in-virtual-environment\/30343\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-in-virtual-environment\/9489\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-in-virtual-environment\/39150\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-in-virtual-environment\/16674\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-in-virtual-environment\/17224\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-in-virtual-environment\/14626\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-in-virtual-environment\/26455\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-in-virtual-environment\/26854\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-in-virtual-environment\/23712\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-in-virtual-environment\/29055\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-in-virtual-environment\/28856\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18164"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18164\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18165"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}