Skip to main content

VMSA-2021-0002 and cryptlocker nevada


BertrandFR
Forum|alt.badge.img+8

Hey everyone, 

There is a huge attack in progress since today, some cloud provider have been impacted.

Arnaud de Bermingham sur Twitter : "🚨A tous : Si vous utilisez ESXi 6.x, mettez à jour IMMÉDIATEMENT, un cryptolock est en train de se propager à toute vitesse ! If you're using ESXi 6.x, update IMMEDIATELY, a cryptolock is rolling out fast!" / Twitter

VMSA-2021-0002 (vmware.com)

French Cybersecurity agency will published soon an alert on this subject.

Have a great weekend,

20 comments

Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • February 3, 2023

Thanks for sharing this.   Made my VMware team aware. 👍🏼


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • February 3, 2023

Thanks for the heads up @BertrandFR 


BertrandFR
Forum|alt.badge.img+8
  • Author
  • Influencer
  • 528 comments
  • February 3, 2023

BertrandFR
Forum|alt.badge.img+8
  • Author
  • Influencer
  • 528 comments
  • February 3, 2023

Update: Not officially confirmed maybe NVD - CVE-2022-31699 (nist.gov) and/or VMSA-2022-0030 (vmware.com) have been used too.

be aware of the weekend's news.


Forum|alt.badge.img

I received a call 15 min ago. One of my customers was attacked


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • 1354 comments
  • February 4, 2023

Will be interesting to get all the details. VMSA-2021-0002 is over 2 years old and all environments should already have received the patches.


MicoolPaul
Forum|alt.badge.img+23
  • 2362 comments
  • February 4, 2023

Having used OVH in the past, they put the VMKernel onto WAN by default with management enabled, and how I wish people would secure that 😔 even outside ESXi you can enable OVH’s firewall to block external access to this except via specific IP addresses.

 

Feels like their deployment templates should at least be trying to default restrict access to the ESXi management to a smaller scope than the whole web 😆


MicoolPaul
Forum|alt.badge.img+23
  • 2362 comments
  • February 4, 2023
regnor wrote:

Will be interesting to get all the details. VMSA-2021-0002 is over 2 years old and all environments should already have received the patches.

Unfortunately most people using services like OVH aren’t then using any shared storage between the hosts, so they’re less likely to have a vCenter managing them, if they have multiple, and even less likely to do proper patching as a result as it’d be bringing all VMs down


BertrandFR
Forum|alt.badge.img+8
  • Author
  • Influencer
  • 528 comments
  • February 4, 2023
MicoolPaul wrote:

Having used OVH in the past, they put the VMKernel onto WAN by default with management enabled, and how I wish people would secure that 😔 even outside ESXi you can enable OVH’s firewall to block external access to this except via specific IP addresses.

 

Feels like their deployment templates should at least be trying to default restrict access to the ESXi management to a smaller scope than the whole web 😆

Only dedicated hosts have been impacted, indeed the security of the machines is the responsibility of the customer… Another good example that the cloud is not magic.


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • 1354 comments
  • February 4, 2023

Any hoster like OHV should at least apply security best practices and scan the customer environments for vulnerabilities. At least that's my opionion as I wouldn't want to host spam relays, botnets, etc.


Nico Losschaert
Forum|alt.badge.img+12
  • On the path to Greatness
  • 681 comments
  • February 4, 2023

Thx for sharing @BertrandFR !


BertrandFR
Forum|alt.badge.img+8
  • Author
  • Influencer
  • 528 comments
  • February 6, 2023
regnor wrote:

Any hoster like OHV should at least apply security best practices and scan the customer environments for vulnerabilities. At least that's my opionion as I wouldn't want to host spam relays, botnets, etc.

Not sure it will cost money, nothing is free...


marcofabbri
Forum|alt.badge.img+13
  • On the path to Greatness
  • 990 comments
  • February 6, 2023

Well, CVEs was from February 2021 and patched since that month.

Only ESXi > 6 and < 6.7.

It use an open port 427, so only the servers exposed on the WAN on that port are vulnerable to this worldwide attack.

For those infected, a researcher has created a guide to recover encrypted VMs:

Show content

On this link there’s a detailed tech analisys on this type of attack.


Stabz
Forum|alt.badge.img+8
  • On the path to Greatness
  • 355 comments
  • February 6, 2023

For people in the need to decrypt your vmdk affected by CVE-2020-3992 you could use the tuto linked by @marcofabbri https://enes.dev/

But be careful there are some new variants:
https://www.helpnetsecurity.com/2023/02/06/nevada-ransomware-upgraded-locker/


Resecurity has identified a new version of Nevada ransomware which recently emerged on the Dark Web right beore the start of 2023


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • February 6, 2023

Well, we are all good for patching for this one which is a relief.  😁


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • 1354 comments
  • February 6, 2023
BertrandFR wrote:
regnor wrote:

Any hoster like OHV should at least apply security best practices and scan the customer environments for vulnerabilities. At least that's my opionion as I wouldn't want to host spam relays, botnets, etc.

Not sure it will cost money, nothing is free...

Hosting vulnerable software and applying bad security pratices damages your reputation and therefore also costs money 😉


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • 1354 comments
  • February 8, 2023

Here's a short response from VMware on the attacks: https://blogs.vmware.com/security/2023/02/83330.html

VMware has not found evidence that suggests an unknown vulnerability (0-day) is being used to propagate the ransomware used in these recent attacks. Most reports state that End of General Support (EOGS) and/or significantly out-of-date products are being targeted with known vulnerabilities which were previously addressed

So to summarize.

  • Don't leave critical vulnerabilities unpatches
  • Don't use End of Life software
  • Don't open critical services to the internet

dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • February 8, 2023

MicoolPaul
Forum|alt.badge.img+23
  • 2362 comments
  • February 8, 2023
dips wrote:

Came here to share this, you beat me to it 👏

 

As for OVH’s reputation @regnor, you saw the massive DC fire the other year right? 😬


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 613 comments
  • February 8, 2023

Comment