NovaMDR leverages leading-edge security technology and world-class security experts
We are committed to supporting our customers in their journey towards regulatory compliance.
ForeNova represents a new way for companies to put an end to relentless, and often undetected, cyber threats coming from every direction. With ForeNova’s unified command center, businesses can detect threats that are already inside their network, and previously unknown.
11 Nov, 2024
5 Nov, 2024
1 Nov, 2024
Table of content
A new ransomware variant targeting VMware ESXi has been wreaking havoc on organizations worldwide since early February. Dubbed ESXiArgs, the ransomware has breached and encrypted thousands of servers as of February 10. Attackers are exploiting unpatched instances of the two-year-old ESXi OpenSLP Heap Overflow Vulnerability CVE-2021-21974 to gain access and deploy ESXiArgs.
ESXiArgs is a new Linux-based ransomware targeting VMware ESXi, an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual machines. Details about EXSiArgs were first disclosed by the French National Government Computer Security Incident Response Team (CERT-FR) in an advisory on February 2, 2023. The advisory observes that the ESXiArgs campaign exploits a two-year-old heap overflow vulnerability (CVE-2021-21974) in ESXi’s OpenSLP service. According to the original VMware security advisory dated February 23, 2021, “A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.” Successful infiltration allows the attacker to load their malicious files onto the server, which would result in the encryption of virtual machines and their data.
CVE-2021-21974 is a patched vulnerability, and attackers are exploiting unpatched instances of ESXi to deploy the ESXiArgs ransomware. CVE-2021-21974 affects the following VMware ESXi versions:
7.x before ESXi70U1c-17325551
6.7.x before ESXi670-202102401-SG
6.5.x before ESXi650-202102101-SG
Vulnerability Name |
VMware ESXi OpenSLP Heap Overflow Vulnerability (CVE-2021-21974) |
Disclosed Date |
23 February 2021 |
Vulnerable Component |
OpenSLP (Service Location Protocol) Service |
Vulnerability Type |
Heap Overflow Vulnerability |
Affected Versions |
7.x prior to ESXi70U1c-17325551 6.7.x prior to ESXi670-202102401-SG 6.5.x prior to ESXi650-202102101-SG |
Severity |
CVSS v3 Base Score: 8.8 (High) |
Exploitability |
Attack Vector: Adjacent Attack Complexity: Low Privileges Required: None User Interaction: None |
Scope |
Unchanged |
Impact |
Confidentiality Impact: High Integrity Impact: High Availability Impact: High |
Patch Status |
Patched |
According to a BleepingComputer article updated on February 5, approximately 120 ESXi servers had been encrypted by the end of the first day of attacks. The article also notes that, based on data from Censys Search, the number of compromised ESXi servers reached 2,400 worldwide after a wave of attacks over the weekend, with the majority in Europe. According to a joint Cybersecurity Advisory dated February 8 by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, the ESXiArgs ransomware campaign has compromised over 3,800 servers globally.
Despite a large number of affected systems, the ESXiArgs campaign has not been particularly successful from the attackers' perspective. In an update to their article on February 6, BleepingComputer reveals that the ransomware payment tracking service Ransomwhere had only tracked four ransom payments for a total of $88,000 up till then.
The low ransom payment figures are most likely attributed to the release of recovery scripts, provided by CISA and by security researcher Enes Sonmez, to help victims rebuild encrypted virtual machines. More information on remediation is provided below.
There are five malicious files involved in an ESXiArgs ransomware attack. These files are stored in the server’s /tmp/ folder after it has been compromised. The names and descriptions of the malicious files are shown in the table below.
File Name |
Description |
encrypt |
The encryptor ELF executable |
encrypt.sh |
A shell script that acts as the logic for the attack. It performs various tasks before and after executing the encryptor. |
public.pem |
A public RSA key used to encrypt the key that encrypts a file |
motd |
The ransom note in text format |
index.html |
The ransom note in HTML format |
The encrypt.sh shell script performs the following tasks before and after executing the encryptor:
The name of the ransom note file is "How to Restore Your Files.html". The note claims that "All files have been stolen and encrypted by us." Victims are then asked to pay a ransom in bitcoin to a specified bitcoin address. Upon payment, victims can obtain the decryption key on TOX. Victim organizations are warned that non-payment within three days will result in some exposure of their data, a higher ransom demand, and a threat to notify their customers.
Early ESXiArgs ransom note in later attacks (Source: BleepingComputer)
In an update to their article on February 6, BleepingComputer revealed a slightly revised ESXiArgs ransom note in which a bitcoin address was not provided. Instead, victims are asked to contact the attackers on TOX to obtain the bitcoin address. Removing the bitcoin address was likely done to prevent any payments from getting tracked.
Modified ESXiArgs ransom note in later attacks (Source: BleepingComputer)
On February 6, the VMware Security Response Center published an article advising users to upgrade to the latest version of ESXi, in which OpenSLP has been disabled by default since 2021.
The VMware article above also mentions that users may disable the OpenSLP service to prevent compromise.
However, there are reports of instances where ESXi servers have been breached and encrypted even with OpenSLP disabled.
ESXi users may check the folders known for storing the malicious files used in an attack, including the /tmp/ folder and the Python backdoor located in /store/packages/vmtools.py. Users are advised to remove these files immediately should they be discovered.
On February 8, CISA released a Cybersecurity Advisory to provide a recovery script for victims of ESXiArgs ransomware attacks to restore their data, with guidance on how to use the script.
ForeNova offers a diverse range of enterprise cybersecurity products and services to help organizations prevent, detect, and respond to ransomware and all forms of cyber-attacks.
NovaCommand: Gain complete visibility of and automate responses to threats missed by other security controls and hiding in your network.
NovaIR: Call on our experienced cybersecurity incident response team to help you contain, investigate, and remediate cyber-attacks and recover and harden your systems.
NovaMDR: Leverage a subscription-based service providing cutting-edge cybersecurity technologies and cybersecurity experts to monitor your networks 24/7.