Due to VMware’s popularity in the virtualization field and its prominence in many organization’s IT systems, their virtual infrastructure products have become highly attractive targets for attackers. This increase in attacks is due to a lack of security tools, inadequate network segmentation of ESXi interfaces, and ITW vulnerabilities for ESXi.
New Ransomware Targeting ESXi Detected in the Wild
In April 2023, CrowdStrike Intelligence discovered a new RaaS program called MichaelKors that delivers ransomware binaries to target Windows and ESXi/Linux systems. Other RaaS tools, such as Nevada ransomware, have also been developed to target ESXi environments.
MichaelKors appears to be a ransomware-as-a-service project. RaaS is a business model developed by ransomware operators to attract affiliates. This model allows affiliates to pay malware creators to launch ransomware attacks. RaaS is based on the popular software-as-a-service IT business model, taking its name and concept from that model.
MichaelKors is not the first ransomware to target ESXi and Linux servers. Previous recent examples include ESXiArgs, Luna, and CheersCrypt.
In February 2023, CERT-FR reported that the ESXiArgs ransomware campaign was actively exploiting two vulnerabilities—CVE-2020-3992 and CVE-2021-21974—targeting unsecured VMware ESXi hypervisors. These vulnerabilities allow an unauthenticated, network-adjacent adversary to execute arbitrary code on affected VMware ESXi instances. Despite being a known threat, this is the first time CVE-2021-21974 has been exploited in the wild (ITW). This is due to the lack of security tools and support for ESXi, CrowdStrike pointed out.