Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new Linux variant of the Play ransomware targeting VMWare ESXi systems
Global Security

A new Linux variant of the Play ransomware targeting VMWare ESXi systems

AdminBy AdminJuly 22, 2024No Comments4 Mins Read
Linux Play Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Linux Play Ransomware

Cyber ​​security researchers have discovered a new variant of Linux ransomware known as to play (aka Balloonfly and PlayCrypt) which is designed for VMWare ESXi environments.

“These developments indicate that the group may be expanding its attacks on the Linux platform, leading to more victims and more successful ransom negotiations,” Trend Micro researchers said. said in a report released Friday.

Play, which appeared on the scene in June 2022, is known for its dual extortion tactics, encrypting systems after stealing sensitive data and demanding payment in exchange for a decryption key. According to estimates published by Australia and the United States, as of October 2023, about 300 organizations have fallen victim to the ransomware group.

Statistics shared by Trend Micro for the first seven months of 2024 show that the US is the country with the highest number of victims, followed by Canada, Germany, the UK and the Netherlands.

Cyber ​​security

Manufacturing, professional services, construction, IT, retail, financial services, transportation, media, legal services and real estate are among the main industries affected by Play ransomware during this period.

The cybersecurity company’s analysis of the Linux variant of Play was taken from a RAR archive located at the IP address (108.61.142(.)190), which also contained other tools identified as being used in previous attacks, such as PsExec, NetScan, WinSCP, WinRAR and the Coroxy backdoor.

“Although no actual infection has been observed, the control (C&C) server hosts common tools that the Play ransomware is currently using in its attacks,” it said. “This may mean that the Linux variant may use similar tactics, techniques and procedures (TTP).”

After execution, the ransomware sample ensures that it is running in an ESXi environment before proceeding to encrypt virtual machine (VM) files, including the VM disk, configuration files, and metadata, and appending them with a “.PLAY” extension. The ransom note is then dropped into the root directory.

Further analysis revealed that the Play ransomware group likely uses services and infrastructure for sale Vintage Pumawhich offers an illegal link shortening service for other cybercriminals to help them avoid detection while distributing malware.

RDGA

Specifically, it uses the so-called Registered Domain Generation Algorithm (RDGA) to generate new domain names, a software mechanism increasingly used by several threat actors, including VexTrio Viper and Revolver Rabbit for phishing, spam, and malware distribution.

Revolver Rabbit, for example, is believed to have registered more than 500,000 domains on the “.bond” top-level domain (TLD) with an estimated value of more than $1 million, using them as active and decoy C2 servers for XLoader (aka FormBook) stealing malware.

“The most common RDGA pattern used by this actor is a series of one or more vocabulary words followed by a five-digit number, with each word or number separated by a dash,” Infoblox noted in a recent analysis. “Sometimes the actor uses ISO 3166-1 country codes, full country names, or numbers corresponding to years instead of dictionary words.”

RDGAs are much more difficult to detect and defend than traditional DGAs because they allow threat actors to create many domain names to register for use – either immediately or over time – in their criminal infrastructure.

“With RDGA, the algorithm is a secret kept by the threat actor, and they register all the domain names,” Infoblox said. “In a traditional DGA, the malware contains an algorithm that can be detected, and most domain names will not be registered. While DGAs are used exclusively to connect to a malware controller, RDGAs are used for a wide variety of malicious activities. “

The latest findings point to potential collaboration between the two cybercriminals, suggesting Play ransomware actors are taking steps to bypass security protocols through Prolific Puma’s services.

“ESXi environments are valuable targets for ransomware attacks because of their critical role in business operations,” Trend Micro concluded. “The efficiency of encrypting many virtual machines simultaneously and the valuable data they store further increases their profitability for cybercriminals.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.