Security News > 2022 > May > New ‘Cheers’ Linux ransomware targets VMware ESXi servers
A new ransomware named 'Cheers' has appeared in the cybercrime space and has started its operations by targeting vulnerable VMware ESXi servers.
We have seen many ransomware groups targeting the VMware ESXi platform in the past, with the most recent additions being LockBit and Hive.
The addition of Cheers ransomware to the club was discovered by analysts at Trend Micro, who call the new variant 'Cheerscrypt'.
These file extensions are associated with ESXi snapshots, log files, swap files, paging files, and virtual disks.
While scanning folders for files to encrypt, the ransomware will create ransom notes named 'How To Restore Your Files.
BleepingComputer found the data leak and victim extortion Onion site for the Cheers ransomware operation, which lists only four victims for now.
News URL
Related news
- Interpol's latest cybercrime intervention dismantles ransomware, banking malware servers (source)
- Microsoft is bringing the Linux sudo command to Windows Server (source)
- RansomHouse gang automates VMware ESXi attacks with new MrAgent tool (source)
- ScreenConnect servers hacked in LockBit ransomware attacks (source)
- LockBit ransomware returns, restores servers after police disruption (source)
- LockBit ransomware returns to attacks with new encryptors, servers (source)
- New Bifrost malware for Linux mimics VMware domain for evasion (source)
- New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion (source)
- BlackCat ransomware turns off servers amid claim they stole $22 million ransom (source)
- VMware Issues Security Patches for ESXi, Workstation, and Fusion Flaws (source)