A ransomware campaign known as ESXiArgs is currently active and malicious actors may be taking advantage of known vulnerabilities in outdated or unpatched versions of VMware ESXi software to gain access to ESXi servers and deploy the ransomware. ESXiArgs encrypts configuration files on ESXi servers, potentially making virtual machines unusable. The CISA and FBI suggest that organizations affected by ESXiArgs ransomware should consider using a script to try and recover their files. They also recommend that all organizations review the advisory and take the necessary steps to protect themselves from ESXiArgs ransomware. This product is subject to the Notification and Privacy & Use policy.
This Cyber News was published on us-cert.cisa.gov. Publication date: Thu, 09 Feb 2023 14:17:03 +0000