Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

This sneaky ransomware is now targeting Linux servers, too
ZDNet ^ | 25 January 2022 | Danny Palmer

Posted on 01/25/2022 11:00:35 AM PST by ShadowAce

One of the most prolific families of ransomware now has additional Linux and VMware ESXi variants that have been spotted actively targeting organisations in recent months.

Analysis by cybersecurity researchers at Trend Micro identified LockBit Linux-ESXi Locker version 1.0 being advertised on an underground forum. Previously, LockBit ransomware – which was by far the most active ransomware family at one point last year – was focused on Windows.

LockBit has a reputation as one of the most sneaky forms of ransomware. And now the Linux and VMware ESXi variant means that the ransomware could potentially spread itself even further, encrypting a wider variety of servers and files – and driving up the pressure for a victim to give in and pay a ransom for the decryption key. 

"The release of this variant is in line with how modern ransomware groups have been shifting their efforts to target and encrypt Linux hosts such as ESXi servers," said Junestherry Dela Cruz, threats analyst at Trend Micro.

"An ESXi server typically hosts multiple VMs, which in turn hold important data or services for an organization. The successful encryption by ransomware of ESXi servers could therefore have a large impact on targeted companies."

By targeting Linux, LockBit is following in the footsteps of other ransomware groups, including REvil and DarkSide, but the popularity of LockBit ransomware-as-a-service means that attacks could have a much wider impact and organisations should be aware of the potential threat.

Like many other ransomware attacks, LockBit steals information from compromised networks and threatens to publish it if the ransom isn't received – and that ransom demand can amount to millions of dollars.

As with previous versions of LockBit, the Linux variant features a note from the attackers that attempts to lure people into handing over corporate account details to further spread ransomware, in exchange for a cut of the profits – although it's unclear if attempting to attract insiders to give up secrets in this way actually works.

Researchers suggest that ransomware is harder to detect on Linux, but that implementing best security practices still provides the best chance of preventing the network from falling victim to an attack.

This includes keeping systems up to date with the latest security patches to prevent intrusions, especially as LockBit is known to exploit vulnerable servers to help it spread. Those behind LockBit attacks have also been known to exploit stolen usernames and passwords, so if it's known that a password has been part of a data breach, it should be changed.

It's also recommended that multi-factor authentication is applied across the entire ecosystem in order to provide an additional layer of defence against attacks.


TOPICS: Computers/Internet
KEYWORDS: linux; ransomware

1 posted on 01/25/2022 11:00:35 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 01/25/2022 11:00:51 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind

Ping.


3 posted on 01/25/2022 11:03:18 AM PST by Carriage Hill (A society grows great when old men plant trees, in whose shade they know they will never sit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

What if all this ‘ransomware’ was actually the government?..................


4 posted on 01/25/2022 11:03:41 AM PST by Red Badger (Homeless veterans camp in the streets while illegal aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Some of it is. I get 5-20 or so threat assessments each day, and at least one a day is a government actor.


5 posted on 01/25/2022 11:09:17 AM PST by CodeToad (Arm up! They Have!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: CodeToad
Is it about 50% from Cheyna, 10% North Korea, 10% Russia, and the rest spread out fairly random?

In the engineering industry (like Huntsville, AL) so much of it is from Cheyna.

6 posted on 01/25/2022 11:15:20 AM PST by Tell It Right (1st Thessalonians 5:21 -- Put everything to the test, hold fast to that which is true.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Tell It Right

Russia is much higher, I’d say. Probably 40%. China is easily 50%.


7 posted on 01/25/2022 11:20:57 AM PST by CodeToad (Arm up! They Have!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce
The way to deal with ransomware is when find the perps, their friends, or family, string them up on piano wire, and post the video to TikTok and Youtube.

8 posted on 01/25/2022 11:21:02 AM PST by Governor Dinwiddie (LORD, grant thy people grace to withstand the temptations of the world, the flesh, and the devil.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Just when you thought it was safe to go back in the water...


9 posted on 01/25/2022 11:21:53 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
But Veronica has noticed that the warranty on my car is
about to expire! She only wants to help me with a once
in a lifetime offer! /s
10 posted on 01/25/2022 11:43:50 AM PST by GaltAdonis (As a nation of freemen we must live through all time or die by suicide. Abe Lincoln)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

.


11 posted on 01/25/2022 12:10:13 PM PST by sauropod (Whom the gods would destroy they first make mad. Life is risk, your highness.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger
What if all this ‘ransomware’ was actually the government?..................

Almost all ransomware is either sponsored by a government or tolerated by officials in exchanged for a percentage payment.

"Everybody" in a local scene knows who the gangs are. Nobody cares as long as the payments keep coming. "Nobody saw nothin'".

Once in a while, the American government reaches a deal with the foreign government and a couple of low-level gangsters get extradited, or an operation gets shut down.

Or somebody makes a score that is too big and destructive to ignore. In those cases, perhaps a basket of heads gets delivered to a field office somewhere. Or maybe that is just a rumor to keep the others in line.

12 posted on 01/25/2022 12:42:38 PM PST by flamberge (Believe half of what you see, and none of what you hear)
[ Post Reply | Private Reply | To 4 | View Replies]

To: carriage_hill

Thank you... :)


13 posted on 01/25/2022 12:53:47 PM PST by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 3 | View Replies]

To: carriage_hill

OK, so here is the difference my friend. Ransomware in this case is different than Ransomware for MS. With MS they lock your system so that it is unusable. This is “We see what you are doing” and they threaten to share that information.

For a personal desktop user this is not really a concern. A diligent astute Linux desktop user would be able to revert their system back and rid themselves of the spyware that allowed them to get this “information”.

It is more “spyware” than it is “ransomware”. Big companies might have to worry about illegal operations or privileged information, but personal users not much at all. I would be about as concerned with this as when I get the bogus emails that claim they caught me watching porn and threaten to tell my wife. lol

When they do not even know my wife...


14 posted on 01/25/2022 1:06:33 PM PST by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 3 | View Replies]

To: GaltAdonis

“But Veronica has noticed that the warranty on my car is
about to expire! She only wants to help me with a once
in a lifetime offer! /s “

First I tell them how eager I am to have my warranty updated. Then I tell them my cars are a 67 Camaro, a 57 Chevy Bel Air and a 48 Chevy 3/4 ton pickup. You can hear their jaws drop. Then for some reason they hang up.


15 posted on 01/25/2022 1:20:43 PM PST by DaxtonBrown
[ Post Reply | Private Reply | To 10 | View Replies]

To: ShadowAce

There is no 100% secure way to find public applications, but at least one can farm out the security patch war to their cloud provider by going severless with aws lambda and dynamodb and the like. Plus it scales automatically and is dirt cheap.


16 posted on 01/25/2022 1:52:47 PM PST by AndyTheBear
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce







17 posted on 01/25/2022 4:35:18 PM PST by Bikkuri (I am proud to be a PureBlood.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
...the Linux variant...

There's a vaccine for that.

18 posted on 01/25/2022 4:40:56 PM PST by Libloather (Why do climate change hoax deniers live in mansions on the beach?)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson