16.1 C
New York
Tuesday, September 3, 2024

Linux model of recent Cicada ransomware targets VMware ESXi servers


Linux model of recent Cicada ransomware targets VMware ESXi servers
Picture: Midjourney

A brand new ransomware-as-a-service (RaaS) operation is impersonating the reputable Cicada 3301 group and has already listed 19 victims on its extortion portal, because it rapidly attacked corporations worldwide.

The brand new cybercrime operation is called after and makes use of the identical brand because the mysterious 2012-2014 on-line/real-world sport named Cicada 3301 that concerned elaborate cryptographic puzzles.

Nonetheless, there isn’t any connection between the 2, and the reputable challenge has issued an announcement to resign any affiliation with the risk actors and condemned the ransomware operation’s actions.

“We have no idea the id of the criminals behind these heinous crimes, and usually are not related to these teams in any approach,” reads the assertion from the Cicada 3301 group.

Launched in early June

The Cicada3301 RaaS first started selling the operation and recruiting associates on June 29, 2024, in a discussion board publish to the ransomware and cybercrime discussion board often known as RAMP.

Nonetheless, BleepingComputer is conscious of Cicada assaults as early as June 6, indicating that the gang was working independently earlier than making an attempt to recruit associates.

Cicada3301 ransomware promoted on RAMP forums
Cicada3301 ransomware operator looking for associates on RAMP boards
Supply: Truesec

Like different ransomware operations, Cicada3301 conducts double-extortion ways the place they breach company networks, steal knowledge, after which encrypt units. The encryption key and threats to leak stolen knowledge are then used as leverage to scare victims into paying a ransom.

The risk actors function a knowledge leak website that’s used as a part of their double-extortion scheme.

Cicada3301 extortion portal
Cicada3301 extortion portal
Supply: BleepingComputer

An evaluation of the brand new malware by Truesec revealed vital overlaps between Cicada3301 and ALPHV/BlackCat, indicating a attainable rebrand or a fork created by former ALPHV’s core workforce members.

That is based mostly on the truth that: 

  • Each are written in Rust.
  • Each Use the ChaCha20 algorithm for encryption.
  • Each make use of similar VM shutdown and snapshot-wiping instructions.
  • Each use the identical person interface command parameters, the identical file naming conference, and the identical ransom word decryption technique.
  • Each use intermittent encryption on bigger information.

For context, ALPHV carried out an exit rip-off in early March 2024 involving faux claims about an FBI takedown operation after they stole an enormous $22 million cost from Change Healthcare from considered one of their associates.

Truesec has additionally discovered indications that the Cicada3301 ransomware operation could accomplice with or make the most of the Brutus botnet for preliminary entry to company networks. That botnet was beforehand related to global-scale VPN brute-forcing actions focusing on Cisco, Fortinet, Palo Alto, and SonicWall home equipment.

It is value noting that the Brutus exercise was first noticed two weeks after ALPHV shut down operations, so the hyperlink between the 2 teams nonetheless stands by way of timelines.

Yet one more risk to VMware ESXi

Cicada3301 is a Rust-based ransomware operation with each Home windows and Linux/VMware ESXi encryptors. As a part of Truesec’s report, the researchers analyzed the VMWare ESXi Linux encryptor for the ransomware operation.

Like BlackCat and different ransomware households, resembling RansomHub, a particular key have to be entered as a command line argument to launch the encryptor. This secret is used to decrypt an encrypted JSON blob that accommodates the configuration that the encryptor will use when encrypting a tool.

Truesec says that the encryptor checks for the validity of the important thing by utilizing it to decrypt the ransom word and, if profitable, continues with the remainder of the encryption operation.

Its primary operate (linux_enc) makes use of the ChaCha20 stream cipher for file encryption after which encrypts the symmetric key used within the course of with an RSA key. The encryption keys are generated randomly utilizing the ‘OsRng’ operate.

Cicada3301 targets particular file extensions matching paperwork and media information and checks their measurement to find out the place to use intermittent encryption (>100MB) and the place to encrypt all the file contents (<100MB).

When encrypting information, the encryptor will append a random seven-character extension to the file identify and create ransom notes named ‘RECOVER-[extension]-DATA.txt,’ as proven under. It must be famous that BlackCat/ALPHV encryptors additionally used random seven-character extensions and a ransom word named ‘RECOVER-[extension]-FILES.txt.’

Cicada3301 ransom note
Cicada3301 ransom word
Supply: BleepingComputer

The ransomware’s operators can set a sleep parameter to delay the encryptor’s execution, probably to evade instant detection.

A “no_vm_ss” parameter additionally orders the malware to encrypt VMware ESXi digital machines with out making an attempt to close them down first.

Nonetheless, by default, Cicada3301 first makes use of ESXi’s ‘esxcli’ and ‘vim-cmd’ instructions to close down digital machines and delete their snapshots earlier than encrypting knowledge.


esxcli –formatter=csv –format-param=fields==”WorldID,DisplayName” vm course of listing | grep -viE ”,(),” | awk -F ””*,”*” '{system(”esxcli vm course of kill –sort=drive –world-id=”$1)}’ > /dev/null 2>&1;

for i in `vim-cmd vmsvc/getallvms| awk '{print$1}’`;do vim-cmd vmsvc/snapshot.removeall $i & finished > /dev/null 2>&1

Cicada3301’s actions and charge of success point out an skilled actor who is aware of what they’re doing, additional supporting the speculation of an ALPHV reboot or at the very least using associates with prior ransomware expertise.

The brand new ransomware’s deal with ESXi environments highlights its strategic design to maximise harm in enterprise environments that many risk actors now goal for profitable income.

By combining file encryption with the flexibility to disrupt VM operations and take away restoration choices, Cicada3301 ensures a high-impact assault that impacts complete networks and infrastructures, maximizing the strain positioned on victims.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles