Description
A newly unveiled digital menace known as MichaelKors Ransomware-as-a-Service. This insidious cyber threat has gained notoriety for its ability to empower malevolent actors with a simple and effective means to unleash devastating ransomware attacks.
Details
The MichaelKors Ransomware-as-a-Service as of April 2023 has been reported as a malware encryption malware targeting Linux and VMware ESXi systems, it was noted an increase in interest by cybercriminals towards ESXi systems due to the absence of third-party agent support or antivirus software, VMware declared this support is not required, however, ESXi is a popularly utilized virtualization and management system making the hypervisor a tempting target for threat actors due to the software being run directly on a physical server, which can potentially grant the threat actor the ability to execute malicious ELF binaries and obtained unrestricted access over the servers resources.
The scale in which the attack campaign is being done reflects a technique called Hypervisor jackpotting which in this scenario would be the practice of distributing ransomware to VMware ESXi hypervisors, this strategy has been used by various ransomware organizations throughout the years, including Royal.
Additionally, a SentinelOne research published found that 10 separate ransomware families, including Conti and REvil, used Babuk source code that had been stolen in September 2021 to create lockers for VMware ESXi hypervisors.
ALPHV (BlackCat), Black Basta, Defray, ESXiArgs, LockBit, Nevada, Play, Rook, and Rorschach are noteworthy e-crime organizations that have modified their toolkit to target ESXi.
The lack of security solutions, insufficient network segmentation of ESXi interfaces, and [in-the-wild] vulnerabilities for ESXi, according to CrowdStrike, “are being recognized by more and more threat actors as a target rich environment.”
There are several other groups that have attacked virtual infrastructure than ransomware criminals. A Chinese nation-state group was implicated in using the innovative backdoors VIRTUALPITA and VIRTUALPIE in attacks on VMware ESXi servers in March 2023, according to Google-owned Mandiant.
According to CrowdStrike, attackers “will probably keep targeting VMware-based virtualization infrastructure.” This poses a severe problem as more businesses move their workloads and infrastructure to the cloud, all through VMWare Hypervisor environments. Play, Rook, Nevada, and Rorschach.
Remediation
Cyber Security tips to protect against the MichaelKors Ransomware-as-a-Service malware:
PDF Download: MichaelKors RaaS: A New Cyber Threat on the Rise.pdf
References
Liu, Nancy. (2023, May 15). Retrieved from sdx central: https://www.sdxcentral.com/articles/news/crowdstrike-finds-new-ransomware-as-a-service-group-targeting-vmware-esxi-servers-5-tips-to-fight-back/2023/05/