Categories: Cyber Security News

Unmasking the Secrets of Lockbit’s Linux ESXi Ransomware – Evasion Tactics and File Encryption Revealed

A comprehensive reverse engineering analysis has unveiled the sophisticated technical mechanisms behind Lockbit’s Linux ESXi ransomware variant, first discovered in 2022 but recently dissected to reveal advanced evasion techniques and cryptographic implementations that specifically target virtualized server environments.

Anti-Analysis Evasion and Obfuscation Techniques

The malware employs a clever anti-debugging mechanism using the ptrace system call to attach to its parent process.

If this operation fails, typically when debugging tools like gdb or strace are already tracing the process, the malware immediately exits, effectively evading dynamic analysis attempts.

String obfuscation adds another layer of protection, with nearly all text strings encrypted using a simple XOR routine with a hardcoded value of 0x39 (57 decimal).

Evasion techniques

This technique conceals critical functionality, including help menus, bash commands for VM navigation, and extensive logging capabilities that ironically make the malware highly verbose once deobfuscated.

ESXi-Specific Attack Vectors

The ransomware demonstrates sophisticated knowledge of VMware ESXi environments through targeted bash command execution.

It automatically enables SSH access via vim-cmd hostsvc/enable_ssh and systematically identifies running virtual machines  vmdumper -l to extract World IDs (WIDs).

The actual crypto

Before encryption, the malware attempts to suspend running VMs up to nine times using esxcli vm process kill --type=force --world-id=$wid, ensuring data integrity during the encryption process.

The malware validates its environment by checking for essential ESXi tools, including. vm-supportvmdumper, and vim-cmd before proceeding with its payload. It can be configured with VM and file extension exclusion lists, demonstrating operational flexibility for targeted attacks.

Advanced Cryptographic Implementation

Analysis revealed a hybrid encryption scheme combining libsodium and optimized AES implementations.

Libsodium vs. Malware

For each file, the malware generates a unique 128-bit encryption key using randombytes_buf, then secures this key within a cryptographic box using crypto_box_seal with a hardcoded public key.

The actual file encryption utilizes an optimized AES implementation featuring T-tables—four lookup tables of 1024 bytes each containing 256 4-byte integers. This approach provides faster encryption performance while maintaining cryptographic security.

Particularly concerning is the malware’s “free space wiping” capability, which overwrites unallocated disk space by creating temporary files and filling them with zeroed data based on filesystem block information, significantly complicating forensic recovery efforts.

The ransomware includes comprehensive logging functionality, writing detailed operation records  /tmp/locklog with timestamps and thread IDs, while creating /tmp/locker.pid a mechanism to prevent multiple simultaneous executions.

Despite law enforcement takedowns of Lockbit infrastructure, this technical analysis provides valuable insights into the evolving sophistication of Linux-targeted ransomware families.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Unmasking the Secrets of Lockbit’s Linux ESXi Ransomware – Evasion Tactics and File Encryption Revealed appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Crimson Desert Update 1.08.00 Adds a Pond to Your Camp, a Cute Baby Wyvern as a Pet, and a Lot More

Crimson Desert has yet another update, making more significant improvements to Pearl Abyss’ single-player open…

51 minutes ago

Vought Rising Teaser Takes Soldier Boy to 1950 as The Boys Spin-off Explores the World’s First Supes

Just as fans come down from The Boys series finale, Prime Video has officially unveiled…

51 minutes ago

This $1,800 Power Lift Recliner and Massage Chair Is Just $380 During the Wayfair Memorial Day Sale

I can think of few activities I'd enjoy more than playing a video game on…

51 minutes ago

SAP Sapphire 2026: The autonomous enterprise takes shape in Madrid

SAP launches its most ambitious AI platform yet in Madrid. With 200+ autonomous agents and…

1 hour ago

Ericsson scales up AI with datafabric and SAP

Ericsson is deploying SAP Business Data Cloud and the Joule AI copilot across its global…

1 hour ago

AccountsIQ cuts month end to record time

A year ago, AccountsIQ announced that Triathlon Ireland would be implementing its financial solution to…

1 hour ago

This website uses cookies.