Saturday, March 25, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > CISA publishes VMware ESXi ransomware recovery tool

CISA publishes VMware ESXi ransomware recovery tool

CISA (Cybersecurity and Infrastructure Security Agency) has published a ransomware recovery tool for everyone who has been affected by the VMware ESXi exploit.


Ezgi Koc Ezgi Koc
February 8, 2023
3 min read
CISA publishes VMware ESXi ransomware recovery tool
  • Cloud7 reported on February 6th, 2023, how hostile actors used two-year-old VMware vulnerabilities, identified as CVE-2021-21972, to launch fresh attacks.
  • With the help of the YoreGroup Tech Team, CISA has produced software that will allow businesses to attempt to recover corrupted virtual computers.
  • Users are strongly recommended, as always, to upgrade their systems as quickly as possible to reduce the risk of exploitation.

On February 6th of 2023, Cloud7 reported that malicious actors were targeting the two-year-old VMware vulnerabilities, tracked as CVE-2021-21972, and launching new attacks. These vulnerabilities are targeted regardless of the fact that updates and patches to combat them are available. CVE-2021-21972 includes an exploit with a CVSSv3 base score of 9.8, a remote code execution vulnerability.

Impacted products were reported as VMware ESXi. VMware vCenter Server (vCenter Server) and VMware Cloud Foundation (Cloud Foundation). A malicious actor with network access might take advantage of this flaw to execute commands with unrestricted capabilities on the underlying operating system that runs vCenter Server.

CISA and the YoreGroup Tech Team to the rescue

CISA has released a script allowing organizations to attempt to recover virtual machines infected with this attack. The GitHub page for the download reads:

« CISA is aware that some organizations have reported success in recovering files without paying ransoms. CISA compiled this tool based on publicly available resources, including a tutorial by Enes Sonmez and Ahmet Aykac. This tool works by reconstructing virtual machine metadata from virtual disks that were not encrypted by the malware. »

OVHcloud also referenced the work of Enes Sonmez by saying:

« In some cases, encryption of files may partially fail, allowing to recover data. Enes Sönmez (@enes_dev), a turkish security researcher has documented the procedure for recovery of VMDK files. The procedure is described on his blog (https://enes.dev/). We tested this procedure as well as many security experts with success on several impacted servers. The success rate is about 2/3. Be aware that following this procedure requires strong skills on ESXi environnements. Use it at your own risk and seek the help of experts to assist. »

Enes Sonmez and Ahmet Aykac of the YoreGroup Tech Team recommend that before adopting CISA’s ESXiArgs recovery script, any business should carefully study it to decide if it is acceptable for their environment. They also clarify that the script attempts to build new config files that allow access to the VMs rather than destroy the encrypted config files.

CISA clarifies that while it attempts to guarantee that scripts like this one are safe and functional, they are offered without any warranties and CISA does not accept any responsibilities if the script causes any harm.

As always, users are strongly advised to upgrade their systems as soon as possible to limit the risk of exploitation. To further guard against these exploits, best network security practices should be followed, as well as keeping all systems up to date with the latest security patches.

How to use the script

You can scroll down to the “Usage” section of the GitHub download page as well as the official guide from the YoreGroup Tech Team, to get a detailed explanation of how to use the script.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: CISA
Ezgi Koc

Ezgi Koc

Ezgi Koc is an editor at Cloud7. She graduated from Ege University with a bachelor's degree in English Language and Literature. She has always had great interest in technology, both hardware and software, since her childhood and decided to pursue a career that would enable her to broaden her horizons in this field. She is very passionate about video games as a Twitch affiliate and streams games in her free time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
phpMyAdmin 4.9.11 and 5.2.1 arrive

phpMyAdmin 4.9.11 and 5.2.1 released

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux
  • CloudFest 2023 is completed

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.