Categories: Cyber Security News

DarkBit Hackers Attacking VMware ESXi Servers to Deploy Ransomware and Encrypts VMDK Files

A newly discovered ransomware campaign has targeted enterprise VMware ESXi environments with military precision, deploying custom-built encryption tools that specifically hunt for virtual machine disk files across VMFS datastores. 

Security researchers have successfully reverse-engineered the attack methodology and developed breakthrough decryption techniques, revealing critical vulnerabilities in the threat actors’ cryptographic implementation that enabled complete data recovery without ransom payment.

Sponsored
class="wp-block-preformatted">Key Takeaways
1. DarkBit ransomware targets VMware ESXi servers.
2. Uses AES-128-CBC encryption with RSA-2048 keys.
3. Researchers broke encryption without ransom payment.

DarkBit Ransomware Attacks

Profero Incident Response Team reports that the DarkBit cybercriminal group launched a coordinated attack against VMware ESXi servers, deploying a sophisticated C++-based ransomware tool specifically designed to encrypt virtual machine disk images. 

The malware, identified as esxi.darkbit (SHA256: 0bb1d29ede51d86373e31485d0e24701558e50856722357372518edfb98265a1), systematically targeted VMFS datastores across enterprise environments.

The attackers utilized esxcli commands to ensure all virtual machines were stopped before beginning the encryption process. 

The ransomware then forked multiple processes to encrypt files concurrently, specifically targeting extensions including .vmdk, .vmx, .nvram, and other VMware-specific file formats. 

Each encrypted file received the .DARKBIT extension, rendering critical business systems inoperable.

Security researchers discovered the malware implements AES-128-CBC encryption using the widely-deployed Crypto++ cryptography library. 

Final encrypted data

The ransomware generates unique AES keys and initialization vectors (IV) for each file, with the symmetric keys subsequently encrypted using a hardcoded RSA-2048 public key embedded within the binary.

The malware’s execution requires specific command-line parameters: ./esxi <path to vmfs> <seconds to sleep before encryption> <list of VMs to encrypt>. 

During analysis, researchers found the encryption process deliberately skips portions of larger files—encrypting 0x100000-byte chunks while skipping 0xa00000 bytes for files under 6.55MB, and using calculated skip sizes for larger files based on (FILESIZE / 0x32) – 0x200000.

Sponsored

Critical vulnerabilities emerged in the random number generator implementation, which seeds using the current timestamp, process PID, and two stack addresses, creating a finite keyspace of approximately 2^39 possible values.

Decryption Via Cryptographic Analysis

Incident response teams successfully exploited weaknesses in the ransomware’s cryptographic implementation to recover encrypted data without paying ransom demands. 

Researchers leveraged the known VMDK file header structure to perform targeted brute-force attacks against the AES keys, utilizing high-performance computing resources to systematically test key combinations.

The breakthrough came through recognizing that VMDK files contain predictable magic bytes in their headers, enabling a cryptanalysis attack against the AES-128-CBC first block when approximately 50 bits of plaintext were known. 

Additionally, investigators discovered that many critical files remained accessible by walking the internal VMDK filesystems, as the sparse nature of virtual disk files left substantial data unencrypted.

The successful recovery highlighted fundamental implementation flaws in the DarkBit ransomware, demonstrating that sophisticated encryption algorithms become vulnerable when improperly implemented with weak random number generation and predictable seed values.

Equip your SOC with full access to the latest threat data from ANY.RUN TI Lookup that can Improve incident response -> Get 14-day Free Trial

The post DarkBit Hackers Attacking VMware ESXi Servers to Deploy Ransomware and Encrypts VMDK Files appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Save 43% Off the Wolfbox 4000A Cordless Jump Starter, Doubles as a 24,000mAh 65W Power Bank

A jump starter is an essential part of car's emergency kit and you don't need…

6 minutes ago

Save 15% Off mfish’s Stylish USB-C Power Banks, Chargers, and Cables

Tired of the same old black brick of a power bank that litters the marketplace?…

1 hour ago

Kunce “ready for the challenge” of task of rebuilding South Beloit Fire Departmen

Kunce's appointment follows the resignation of the city's previous choice, Scott Fisher, who left the…

2 hours ago

Get a 2-Pack of 6.6ft USB Type-C Cables for $5.99

USB Type-C has become the standard for charging and data cables alike, so it's good…

2 hours ago

Best Buy’s Excellent Cyberpowerpc Ryzen X3D Radeon RX 9070 XT Gaming PC Deal Ends Tonight

Best Buy is offering an excellent deal on a gaming PC that can comfortably run…

2 hours ago

National Weather Service takes you behind the scenes of predicting severe weather

National Weather Service will be presenting a new seminar series later this month, focusing on…

2 hours ago

This website uses cookies.