banner Expire 1 July 2024
Ad Ends 13 July 2024
banner Expire 15 July 2024
banner Expire 18 October 2024
ad End 18 October 2024
Ad Ends 13 July 2023
banner Expire 20 July 2024
What's new
Ad expire at 5 June 2024
UniCvv
CrdCrew.cc Carding forum
Western union transfer
Kfc CLub
Carding.pw carding forum
adv exp at 23 August 2024

Anonymous

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 21, 2020
Messages
5,634
Reaction score
1,364
Points
1,012
Awards
4
  • Rich User
  • trusted user
  • Somebody Likes you
  • First post
A single administrator error can affect the entire corporate network.

The Israeli cybersecurity company Sygnia notes that virtualization platforms such as VMware ESXi often suffer from incorrect settings and vulnerabilities, which makes them attractive targets for hackers.

In the course of investigations related to various ransomware families, such as LockBit, HelloKitty, BlackMatter, and others, Sygnia found that attacks on virtualization environments follow a set sequence of actions:

  1. Gaining initial access: Attackers use phishing attacks, downloading malicious files, and exploiting known vulnerabilities in systems accessible from the Internet.
  2. Privilege escalation: Attackers gain access to credentials for ESXi or vCenter hosts using various methods, including brute-force attacks.
  3. Access verification: Cybercriminals check access to the virtualization infrastructure and implement ransomware.
  4. Deleting or encrypting backups: To complicate the recovery process, backups are either deleted or encrypted, and sometimes passwords are changed.
  5. Data exfiltration: Data is sent to external resources, such as Mega.io, Dropbox, or the attackers own hosting services.
  6. Starting the ransomware: Encryption of the "/vmfs/volumes" folder in the ESXi file system begins.
  7. Ransomware distribution: Ransomware is distributed to "non-virtualized" servers and workstations to expand the attack zone.

2bjn52keh15ssr4l6mixfsqkwwmqmjsw.png


Attack Chain

How to protect yourself

To minimize risks, organizations should ensure proper monitoring and logging, establish reliable backup mechanisms, implement strong authentication measures, strengthen infrastructure, and limit network activity to prevent intra-network movement.
 
Ad End 1 July 2024
Top