logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • Software rollout failure led to Devon & Cornwall cops recording zero crime for 3 months

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2962 (faculty_evaluation_system) 29 May 2023
  • CVE-2023-2955 (students_online_internship_timesheet_system) 29 May 2023
  • CVE-2023-24600 (ox_app_suite) 29 May 2023
  • CVE-2023-24601 (ox_app_suite) 29 May 2023
  • CVE-2023-24602 (ox_app_suite) 29 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Ransomware gangs are abusing VMWare ESXi exploits to encrypt virtual hard disks

Posted on 2 February 2021

From zdnet.com

cloud-provider-stopped-ransomware-attack-5f158ee1ef2c1c64094a991b-1-jul-23-2020-14-40-19-poster.jpg

At least one major ransomware gang is abusing vulnerabilities in the VMWare ESXi product to take over virtual machines deployed in enterprise environments and encrypt their virtual hard drives.

Read more…

Posted in News

Post navigation

Previous post: Exploiting a bug in Azure Functions to escape Docker
Next post: Spanish banished: Google Chrome to snub Camerfirma for lax cert management
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.