This dangerous new Linux malware is going after VMware systems with multiple extortion attempts

ID theft
Image credit: Pixabay (Image credit: Future)

Cybersecurity researchers from Trend Micro recently found a Linux variant of the dreaded Play ransomware strain targeting VMWare ESXi environments.

In a technical breakdown, Trend Micro’s Threat Hunting team said this was the first time Play was seen targeting ESXi environments, and it could be that the criminals are broadening their attacks across the Linux platform, giving them an expanded victim pool and more successful ransom negotiations.

Play was first spotted more than two years ago, and since then it became popular for its double-extortion tactics, evasion techniques, custom-built tools, and a “substantial impact” on companies in Latin America, the researchers explained.

Prolific Puma and Revolver Rabbit

Businesses usually use VMWare’s ESXi instances for virtual machines, where they host critical applications, data, and integrated backup solutions. By targeting these endpoints, Play’s operators could reduce the chances of the victim recovering any encrypted data. Therefore, their negotiation position becomes that much better. Besides going after Linux endpoints, the new variant was also able to successfully evade security detections, Trend Micro added.

Analyzing the infrastructure used for these campaigns, the researchers found a peculiarity - the URL used to host the encryptor is related to a threat actor known as Prolific Puma. This group is known for offering URL-shortening services to criminals, making phishing attacks more convincing, and thus, more disruptive. 

In late 2023, researchers Infoblox discovered a major link-shortening operation in which the criminals would use a registered domain generation algorithm (RDGA) to create domain names in bulk. Then, they would use those domains to provide a link-shortening service to other malicious actors.

Earlier this month, the same company found a threat actor called Revolver Rabbit using RDGAs to register more than 500,000 domains, an effort on which they spent more than a million dollars. The hacker used the RDGA to create command and control (C2) and decoy domains for the XLoader infostealing malware.

Via The Hacker News

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person holding out their hand with a digital AI symbol.
This ransomware gang is using SSH tunnels to target VMware appliances
Close up of the Linux penguin.
A new Linux backdoor is hitting US universities and governments
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Interlock ransomware attacks highlight need for greater security standards on critical infrastructure
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over