Skip to main content

Secure your VMware (HelloKitty ransomware targets VMware ESX) hosts against ransomware in 3 simple steps!

  • July 27, 2021
  • 6 comments
  • 694 views

Link State
Forum|alt.badge.img+11

6 comments

Chris.Childerhose
Forum|alt.badge.img+21

Yes I remember this from his digest.  Good information.


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • July 27, 2021

Nothing's safe anymore...Linux and ESXi and probably those systems where administrators don't think that they could be attacked.

Thanks for posting it @Link State 


Forum|alt.badge.img+3
  • Experienced User
  • July 27, 2021

@Link State : A lot of Ransomware attacks these day. Thanks for sharing this !


regnor
Forum|alt.badge.img+14
  • Veeam MVP
  • July 29, 2021

Does anyone have (positive/negative) experience with the VMkernel.Boot.execInstalledOnly setting? I’m wondering if this could cause issues with OEM/3rd party management tools. Although those should come from a signed VIB file, I’m still not sure; for example all HPE tools which are bundled in the custom images.


  • New Here
  • August 5, 2021

hi All,

May I ask the 3 Steps must be complete ? what if I just enable VMkernel.Boot.execInstalledOnly but no action on TPM and UEFI? My server is IBM x3650M4 and running ESXi6.5 but my server only have TPM 1.2 and didn’t enable and the UEFI also not set because no UAT for test and don’t know will it cause issue after I set UEFI boot.  

 

Thanks

 

Bear


Forum|alt.badge.img+3
  • Experienced User
  • August 5, 2021

@Link State : I heard about this thread from somewhere else as well !