Secure your VMware (HelloKitty ransomware targets VMware ESX) hosts against ransomware in 3 simple steps!


Userlevel 7
Badge +7

Hi all,

from Gostev's Veeam R&D Forums Digest, report a new threat targeting ESXi hosts

Secure your VMware ESXi hosts against ransomware in 3 simple steps! (truesec.com)

 

Linux version of HelloKitty ransomware targets VMware ESXi servers (bleepingcomputer.com)


6 comments

Userlevel 7
Badge +20

Yes I remember this from his digest.  Good information.

Userlevel 7
Badge +14

Nothing's safe anymore...Linux and ESXi and probably those systems where administrators don't think that they could be attacked.

Thanks for posting it @Link State 

Userlevel 7
Badge +4

@Link State : A lot of Ransomware attacks these day. Thanks for sharing this !

Userlevel 7
Badge +14

Does anyone have (positive/negative) experience with the VMkernel.Boot.execInstalledOnly setting? I’m wondering if this could cause issues with OEM/3rd party management tools. Although those should come from a signed VIB file, I’m still not sure; for example all HPE tools which are bundled in the custom images.

hi All,

May I ask the 3 Steps must be complete ? what if I just enable VMkernel.Boot.execInstalledOnly but no action on TPM and UEFI? My server is IBM x3650M4 and running ESXi6.5 but my server only have TPM 1.2 and didn’t enable and the UEFI also not set because no UAT for test and don’t know will it cause issue after I set UEFI boot.  

 

Thanks

 

Bear

Userlevel 7
Badge +4

@Link State : I heard about this thread from somewhere else as well !

Comment