Linux version of Abyss Locker ransomware targets VMware ESXi servers

Teilen:

The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in attacks on the enterprise.

As the enterprise shifts from individual servers to virtual machines for better resource management, performance, and disaster recovery, ransomware gangs create encryptors focused on targeting the platform.

With VMware ESXi being one of the most popular virtual machine platforms, almost every ransomware gang has begun to release Linux encryptors to encrypt all virtual servers on a device.

Other ransomware operations that utilize Linux ransomware encryptors, with most targeting VMware ESXi, include AkiraRoyalBlack BastaLockBitBlackMatterAvosLockerREvilHelloKittyRansomEXXund Hive.

The Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March 2023, when it began to target companies in attacks.

Like other ransomware operations, the Abyss Locker threat actors will breach corporate networks, steal data for double-extortion, and encrypt devices on the network.

The stolen data is then used as leverage by threatening to leak files if a ransom is not paid. To leak the stolen files, the threat actors created a Tor data leak site named ‘Abyss-data’ that currently lists fourteen victims.

Abyss Locker data leak site
Abyss Locker data leak site
Quelle: BleepingComputer

The threat actors claim to have stolen anywhere between 35 GB of data from one company to as high as 700 GB at another.

Targeting VMware ESXi servers

This week, security researcher MalwareHunterTeam found a Linux ELF encryptor for the Abyss Locker operation and shared it with BleepingComputer for analysis.

After looking at the strings in the executable, it is clear that the encryptor specifically targets VMware ESXi servers.

As you can see from the commands below, the encryptor utilizes the ‘esxcli’ command-line VMware ESXi management tool to first list all available virtual machines and then terminate them.

esxcli vm process list
esxcli vm process kill -t=soft -w=%d
esxcli vm process kill -t=hard -w=%d
esxcli vm process kill -t=force -w=%d

When shutting down the virtual machines, Abyss Locker will use the ‘vm process kill’ command and one of the soft, hard, or forced options.

Die soft option performs a graceful shutdown, the hard option terminates a VM immediately, and force is used as a last resort.

The encryptor terminates all virtual machines to allow the associated virtual disks, snapshots, and metadata to be properly encrypted by encrypting all files with the following extensions: .vmdk (virtual disks), .vmsd (metadata), and .vmsn (snapshots).

In addition to targeting virtual machines, the ransomware will also encrypt all other files on the device and append the .crypt extension to their filenames, as shown below.

Encrypted files and ransom notes
Encrypted files and ransom notes
Quelle: BleepingComputer

For each file, the encryptor will also create a file with a .README_TO_RESTORE extension, which acts as the ransom note.

This ransom note contains information on what happened to the files and a unique link to the threat actor’s Tor negotiation site. This site is barebones, only having a chat panel that can be used to negotiate with the ransomware gang.

Abyss Locker ransom note
Abyss Locker ransom note
Quelle: BleepingComputer

Ransomware expert Michael Gillespie said that the Abyss Locker Linux encryptor is based on Hello Kitty, using ChaCha encryption instead.

However, it is not known if this is a rebrand of the HelloKitty operation or if another ransomware operation gained access to the encryptor’s source code, as we saw with Vice Society.

Unfortunately, HelloKitty has historically been a secure ransomware, preventing the recovery of files for free.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:13 am, Juni 1, 2025
Wetter-Symbol 14°C
L: 13° | H: 15°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 83 %
Druck: 1014 mb
Wind: 8 mph SW
Windböe: 9 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 33%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:49 am
Sonnenuntergang: 9:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
13° | 15°°C 0.2 mm 20% 15 mph 74 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 21°°C 0 mm 0% 12 mph 81 % 1019 mb 0 mm/h
Di. Juni 03 10:00 pm
Wetter-Symbol
11° | 19°°C 1 mm 100% 17 mph 89 % 1013 mb 0 mm/h
Mi. Juni 04 10:00 pm
Wetter-Symbol
9° | 17°°C 0.61 mm 61% 13 mph 79 % 1011 mb 0 mm/h
Do. Juni 05 10:00 pm
Wetter-Symbol
11° | 17°°C 1 mm 100% 15 mph 96 % 1010 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
15° | 16°°C 0 mm 0% 11 mph 74 % 1014 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
16° | 17°°C 0 mm 0% 13 mph 52 % 1014 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
18° | 18°°C 0.2 mm 20% 11 mph 55 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 8 mph 69 % 1015 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
13° | 13°°C 0 mm 0% 6 mph 81 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 8 mph 71 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,138.05
0.86%
Ethereum(ETH)
€2,220.81
0.10%
Fesseln(USDT)
€0.88
0.01%
XRP(XRP)
€1.91
1.83%
Solana(SOL)
€136.94
0.49%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.168171
0.84%
Shiba Inu(SHIB)
€0.000011
3.03%
Pepe(PEPE)
€0.000011
3.41%
Peanut das Eichhörnchen(PNUT)
€0.230836
4.04%
Nach oben scrollen