Linux Blackmatter Ransomware Variant Poses a Threat to VMware ESXi Servers
Threat Actors Developed a Linux Encryptor That Runs Different Commands to Compromise the Virtual Machine.
Last updated on August 6, 2021
The hacking gang behind the BlackMatter Ransomware goes on with its malicious activity. Now they developed a Linux BlackMatter Ransomware variant. Through a Linux encryptor, the targeted machine is none other than VMware’s ESXi.
What Is This Linux BlackMatter Ransomware Variant About?
Its target: servers belonging to VMware ESXi and it was specifically built to attack these servers.
How? Via an ‘esxi_utils’ library. This way hackers can perform whatever action they want on the server.
The esxcli command-line management tool will be used that would determine each function from this library to execute a different command: for instance, stopping or listing a VM or making the firewall cease working.
These details were shared with BleepingComputer by Vitali Kremez, a reverse engineer from Advanced Intel.
Analyzing the sample below regarding the Linux BlackMatter Ransomware variant he clarified that for example the function stop_firewall() you can see in the last lines will trigger the command esxcli network firewall set –enabled false, while the function stop_vm() will lead to esxcli vm process kill –type=force –world-id [ID] command.
What is interesting to note here is a method hacking groups use to safely encrypt data. When attacking ESXi serves, firstly they shut down the virtual machines, then they encrypt the drive. After the VM is off than certain documents corresponding to certain extensions will be encrypted. And what’s more dangerous here is that with just one command a big number of servers can be encrypted.
Who Is BlackMatter Ransomware and When Did They Appear?
BlackMatter is actually a newly formed malicious gang that emerged last month. It is said that they take after the DarkSide and REvil groups. Their activity consisted in recruiting many cybercriminals to attack organizations from the U.S., U.K., Canada, or Australia. Their goal was to gain access to the corporate networks and what was interesting about them is that they declared to exclude some industries from their attack lists, industries like healthcare, oil & gas, critical infrastructure, and so on.
It is thought to be a better form of DarkSide because it was determined that the encryption routines are the same as those used by the latter which stopped its activity after the matter with Colonial Pipeline.
The main reason why this company is targeted by ransomware groups it’s because it has increased its popularity related to their shifting to virtual machines that support their servers for more advanced resource maintenance and rehabilitation after a disaster.
Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!