Linux version of Abyss Locker ransomware targets VMware ESXi servers

Teilen:

The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in attacks on the enterprise.

As the enterprise shifts from individual servers to virtual machines for better resource management, performance, and disaster recovery, ransomware gangs create encryptors focused on targeting the platform.

With VMware ESXi being one of the most popular virtual machine platforms, almost every ransomware gang has begun to release Linux encryptors to encrypt all virtual servers on a device.

Other ransomware operations that utilize Linux ransomware encryptors, with most targeting VMware ESXi, include AkiraRoyalBlack BastaLockBitBlackMatterAvosLockerREvilHelloKittyRansomEXXund Hive.

The Abyss Locker

Abyss Locker is a relatively new ransomware operation that is believed to have launched in March 2023, when it began to target companies in attacks.

Like other ransomware operations, the Abyss Locker threat actors will breach corporate networks, steal data for double-extortion, and encrypt devices on the network.

The stolen data is then used as leverage by threatening to leak files if a ransom is not paid. To leak the stolen files, the threat actors created a Tor data leak site named ‘Abyss-data’ that currently lists fourteen victims.

Abyss Locker data leak site
Abyss Locker data leak site
Quelle: BleepingComputer

The threat actors claim to have stolen anywhere between 35 GB of data from one company to as high as 700 GB at another.

Targeting VMware ESXi servers

This week, security researcher MalwareHunterTeam found a Linux ELF encryptor for the Abyss Locker operation and shared it with BleepingComputer for analysis.

After looking at the strings in the executable, it is clear that the encryptor specifically targets VMware ESXi servers.

As you can see from the commands below, the encryptor utilizes the ‘esxcli’ command-line VMware ESXi management tool to first list all available virtual machines and then terminate them.

esxcli vm process list
esxcli vm process kill -t=soft -w=%d
esxcli vm process kill -t=hard -w=%d
esxcli vm process kill -t=force -w=%d

When shutting down the virtual machines, Abyss Locker will use the ‘vm process kill’ command and one of the soft, hard, or forced options.

Die soft option performs a graceful shutdown, the hard option terminates a VM immediately, and force is used as a last resort.

The encryptor terminates all virtual machines to allow the associated virtual disks, snapshots, and metadata to be properly encrypted by encrypting all files with the following extensions: .vmdk (virtual disks), .vmsd (metadata), and .vmsn (snapshots).

In addition to targeting virtual machines, the ransomware will also encrypt all other files on the device and append the .crypt extension to their filenames, as shown below.

Encrypted files and ransom notes
Encrypted files and ransom notes
Quelle: BleepingComputer

For each file, the encryptor will also create a file with a .README_TO_RESTORE extension, which acts as the ransom note.

This ransom note contains information on what happened to the files and a unique link to the threat actor’s Tor negotiation site. This site is barebones, only having a chat panel that can be used to negotiate with the ransomware gang.

Abyss Locker ransom note
Abyss Locker ransom note
Quelle: BleepingComputer

Ransomware expert Michael Gillespie said that the Abyss Locker Linux encryptor is based on Hello Kitty, using ChaCha encryption instead.

However, it is not known if this is a rebrand of the HelloKitty operation or if another ransomware operation gained access to the encryptor’s source code, as we saw with Vice Society.

Unfortunately, HelloKitty has historically been a secure ransomware, preventing the recovery of files for free.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:15 am, Mai 24, 2025
Wetter-Symbol 14°C
L: 13° | H: 15°
overcast clouds
Luftfeuchtigkeit: 90 %
Druck: 1012 mb
Wind: 9 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 8:58 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
13° | 15°°C 0.24 mm 24% 14 mph 92 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 19°°C 1 mm 100% 16 mph 92 % 1015 mb 0 mm/h
Mo. Mai 26 10:00 pm
Wetter-Symbol
10° | 16°°C 0.78 mm 78% 15 mph 78 % 1017 mb 0 mm/h
Di. Mai 27 10:00 pm
Wetter-Symbol
13° | 17°°C 1 mm 100% 15 mph 95 % 1016 mb 0 mm/h
Mi. Mai 28 10:00 pm
Wetter-Symbol
14° | 21°°C 1 mm 100% 16 mph 96 % 1019 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
15° | 16°°C 0.24 mm 24% 11 mph 92 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 21°°C 0.06 mm 6% 13 mph 70 % 1011 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 14 mph 57 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 67 % 1010 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 11 mph 84 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0.2 mm 20% 11 mph 88 % 1008 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
14° | 14°°C 1 mm 100% 16 mph 92 % 1007 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 0.8 mm 80% 14 mph 84 % 1008 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€94,967.38
-2.34%
Ethereum(ETH)
€2,239.01
-4.30%
Fesseln(USDT)
€0.88
0.02%
XRP(XRP)
€2.06
-3.67%
Solana(SOL)
€153.48
-3.80%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.200364
-6.77%
Shiba Inu(SHIB)
€0.000012
-6.40%
Pepe(PEPE)
€0.000012
-9.50%
Peanut das Eichhörnchen(PNUT)
€0.309088
-5.49%
Nach oben scrollen