Monday, March 27, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Okta User Error Could Lead to Password Compromise, And More!

    Okta User Error Could Lead to Password Compromise, And More!

    Cinoshi Malware-as-a-Service

    MaaS on Sale: Cybercrime Forum Selling Cinoshi Malware-as-a-Service for 2000 Rubles

    E-learning Platform Moodle

    Vulnerabilities Found in E-learning Platform Moodle, Users Urged to Update

    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Okta User Error Could Lead to Password Compromise, And More!

    Okta User Error Could Lead to Password Compromise, And More!

    Cinoshi Malware-as-a-Service

    MaaS on Sale: Cybercrime Forum Selling Cinoshi Malware-as-a-Service for 2000 Rubles

    E-learning Platform Moodle

    Vulnerabilities Found in E-learning Platform Moodle, Users Urged to Update

    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

CISA Issues Recovery Script for ESXiArgs Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA), USA, has put out a script to retrieve VMware ESXi servers that were encrypted in the recent widespread ESXiArgs ransomware attacks.

Vishwa Pandagle by Vishwa Pandagle
February 8, 2023
in Firewall Daily, Ransomware News
0
ESXiArgs Ransomware
617
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

The Cybersecurity and Infrastructure Security Agency (CISA), USA, has put out a script to retrieve VMware ESXi servers that were encrypted in the recent widespread ESXiArgs ransomware attacks.

ESXiArgs-Recover can help regain access to virtual machines (VM) and several files. Since the effectiveness of the recovery script cannot be confirmed on all systems, the tool can help reconstruct virtual machine metadata from virtual disks that were not impacted by the ransomware ESXiArgs.

You might also like

Twitter Source Code Leaked, Suspected Former Employee Behind the Breach

Buro de Credito Data Breach Unconfirmed, Telegram Vendor Claims to Sell Data

North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

A widespread ESXiArgs ransomware attack that started last Friday has been aimed at exposed VMware ESXi servers, with 2,800 servers being encrypted since. Agenzia per la Cybersicurezza Nazionale (ACN), Italy’s national cybersecurity agency, issued a global warning about a massive ransomware attack on Sunday.

CISA’s Recovery Script ESXiArgs-Recover

Cybersecurity & Infrastructure Security Agency (CISA) made the ESXiArgs-Recover recovery script available on February 7. Inputs from third-party researchers and tutorials by Enes Sonmez were added to it. The ransomware recovery script can be applied as follows:

  1. Downloading and saving the recovery script as /tmp/recover.sh
  2. Allow the permission to execute the script: chmod +x/tmp/recover.sh
  3. Run 1s /vmfs/volumes/datastore1 to browse and decrypt folders
  4. Run 1s to view files to make a note of the VM.
  5. Adding the name of the virtual machine in the name here – /tmp.recover.sh [name], run this CISA recovery script.

After running the ransomware recovery script, one will know whether the virtual machine can be recovered or not. If the ESXiArgs-Recover script runs successfully, one will need to re-register the virtual machine.

To remove the ransom note, move it to the ransom.html file and regain access to the ESXi web interface, the following steps is advised:

  1. Run: cd /usr/lib/vmware/hostd/docroot/ui/ & mv index.html ransom.html & mv index1.html index.html
  2. Run: cd /usr/lib/vmware/hostd/docroot & mv index.html ransom.html & rm index.html & mv index1.html index.html
  3. Reboot the ESXi server to navigate to the web surface minutes after.
  4. Navigate to the virtual machines page in the ESXi web interface
  5. If the restored virtual machine already exists, unregister it by right-clicking on the VM and selecting Unregister.
  6. Next, click on Create/ Register VM.
  7. Choose: Register an existing virtual machine
  8. To access the restored VM folder, click: Select one or more virtual machines, a datastore or a directory
  9. Select the vmx file from the folder.
  10. Click Next > Finish. This will allow complete access to the virtual machine.

This CISA recovery script ESXiArgs-Recover was made available without any warranty and understanding of the application of the script is expected on the part of the engineer.

The ransomware attack using an old vulnerability

A patch for the vulnerability CVE-2021-21974 was issued on 23 February 2021. However, cybercriminals tapped it by targeting unpatched systems:

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/02/Figure-1-Statistics-of-Args-Ransomware-Source-Shodan.jpg?w=962&ssl=1

Countries impacted by the ESXi Args ransomware (Photo: Cyble)

First observed in Italy, the ESXi Args ransomware attack impacted France, followed by the United States of America. An encryptor posted on the Bleeping Computer support forum has also been found.

This ransomware attack includes two files named encrypt.sh, a shell script and encrypt, an ELF executable to encrypt the files.

The shell script looks for all the .log files in the root directory to delete them. This also erases the traces of the ransomware to evade detection. This was found by the Cyble Research & Intelligence Labs (CRIL) researchers from the sample hash: (SHA256), 11b1b2375d9d840912cfd1f0d0d04d93ed0cddb0ae4ddb550a5b62cd044d6b66.

The team discovered that the malicious file was a 64-bit gcc compiled ELF binary as the image below:

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/02/Figure-7-Static-details-of-Ransomware-payload.jpg?w=914&ssl=1

(Photo: Cyble)

Previously known vulnerabilities are exploited to cause severe damage to infrastructure and routine operations. New vulnerabilities remain the focal point in ensuring the highest security in software to avoid exploitation however, it is just as crucial to patch all the vulnerabilities in the system that may be using an older version of the software.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: CISA ESXiArgs-Recover ScriptESXiArgs ransomware recoveryransomware patchRecovery script for ransomwareThe Cyber ExpressThe Cyber Express News
Previous Post

Australian Scammer Targeting Optus Data Breach Victims Sentenced to 18 Months

Next Post

Weee! Data Breach: 11M User Records Leaked By Unknown Threat Actor

Vishwa Pandagle

Vishwa Pandagle

Vishwa Pandagle is a Technical Writer at The Cyber Express. She writes cybersecurity news related to data breaches, ransomware, phishing, and best practices among others. She also writes about cybersecurity developments and likes interacting with experts in this field. When not working, she likes self-reflecting, meditating, volunteering, and going for long walks.

Related Posts

Twitter Source Code Leaked
Data Breach News

Twitter Source Code Leaked, Suspected Former Employee Behind the Breach

by Ashish Khaitan
March 27, 2023
Buro de Credito Data Breach
Data Breach News

Buro de Credito Data Breach Unconfirmed, Telegram Vendor Claims to Sell Data

by Vishwa Pandagle
March 27, 2023
cybersecurity-education-legislation
Firewall Daily

North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

by Vishwa Pandagle
March 27, 2023
Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack
Firewall Daily

Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

by Ashish Khaitan
March 27, 2023
Okta User Error Could Lead to Password Compromise, And More!
Firewall Daily

Okta User Error Could Lead to Password Compromise, And More!

by Chandu Gopalakrishnan
March 27, 2023
Next Post
Weee! Data Breach

Weee! Data Breach: 11M User Records Leaked By Unknown Threat Actor

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.