No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

ESXi ransomware derived from Babuk code on the rise in early 2023

May 12, 2023
in Protection
0
ESXi ransomware derived from Babuk code on the rise in early 2023



There’s mounting evidence that ESXi hypervisors remain valuable targets for ransomware groups and that the leak of Babuk source code in September 2021 offered unprecedented insight for threat actors into the development operations of an organized ransomware group.

In a May 11 blog post, SentientlLabs reported that they observed a strong increase in VMware ESXi ransomware based on Babuk throughout early 2023.

However, Alex Delamotte, a SentinelOne threat researcher, said while other researchers claimed that Feburary’s ESXiArgs campaign on VMware servers was based on Babuk source code, SentinelOne’s analysis found that it’s unlikely because the only significant similarity between ESXiArgs and Babuk is that both use the same open-source libraries to implement the Sosemanuk stream cipher to encrypt files.

“The takeaway is that ESXi ransomware remains a popular target and the leaked Babuk source code enables actors of all skill levels to participate,” explained Delamotte. “The ESXiArgs campaign likely demonstrated the value and impact of ESXi lockers to a wider audience, which drove the increase in new Babuk-like variants through Q1 and Q2 2023.”

SentinelLabs said that over the past two years, organized ransomware groups adopted Linux lockers, including ALPHV, Black Basta, Conti, Lockbit and REvil. These groups focus on ESXi before other Linux variants, leveraging built-in tools for the ESXi hypervisor to kill guest machines, then encrypt crucial hypervisor files.

SentinelLabs also reported that it identified unexpected connections between ESXi ransomware families, exposing likely relationships between Babuk and better-known operations such as Conti and REvil. While ties to REvil remain tentative, the SentinelLabs researchers said the possibility exists that Babuk, Conti and REvil potentially outsourced an ESXi locker project to the same developer.

Companies are prime targets if they use ESXi and don’t have an accurate view into the version used, where those assets reside in their network, and if they face the public internet, said Dan Paulmeno, director of managed security services at Kivu Consulting.  

“In this case, a lot of ransomware crews that don’t normally target ESXi pounced on this opportunity because scanning and script deployment opportunities are trivial in comparison to enterprisewide attacks,” said Paulmeno.

This new information continues a trend of attacks on ESXi by cybercriminals looking for windfalls by compromising a host of hosts, said Craig Burland, chief information security officer at inversion6. Burland said the ESXiArgs attacks highlighted a big challenge with ESXi: timely patching. 

“Patching workloads related to a single application typically takes some negotiation between IT and the business owner,” Burland said. “Planning patches for ESXi immediately sparks 20 of those conversations and triggers the business to question the real risk of not applying every update.”

Mike Parkin, senior technical engineer at Vulcan Cyber, added that it’s always fascinating to get insight into how cybercriminal organizations operate both in how they function and how they develop code.  Parkin said it makes sense that other threat actors continued to develop the leaked Babuk code to suit their own needs. 

“While the Babuk leak may have hurt that specific group, it became an opportunity for other threat actors to incorporate new tools and techniques into their own attacks,” said Parking. “It becomes a challenge for defenders because even though we now have access to the original attack code, there will be more iterations of it that we’ll have to counter and the new variants will be harder to associate with a specific threat group.”

Editorial Team

Editorial Team

Related Posts

How EU Regulators Might Change TikTok
Protection

How EU Regulators Might Change TikTok

February 7, 2026
Best Fitness Hacks Every Apple Watch User Should Know
Protection

Best Fitness Hacks Every Apple Watch User Should Know

February 6, 2026
How to Create a Sleep Routine That's Perfect for You
Protection

How to Create a Sleep Routine That’s Perfect for You

February 6, 2026
The Shokz OpenRun Bone Conduction Headphones Are Just $90 Right Now
Protection

The Shokz OpenRun Bone Conduction Headphones Are Just $90 Right Now

February 6, 2026
This Substack Data Breach May Have Compromised Nearly 700,000 User Records
Protection

This Substack Data Breach May Have Compromised Nearly 700,000 User Records

February 6, 2026
Blink's Highly Rated Wired Floodlight Camera Is Just $45 Right Now
Protection

Blink’s Highly Rated Wired Floodlight Camera Is Just $45 Right Now

February 6, 2026
Load More
Next Post
Backlog in UK vetting poses national security risks, say MPs

Backlog in UK vetting poses national security risks, say MPs

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • 11 Best Affordable Hotels in Rome (2024)

    0 shares
    Share 0 Tweet 0
  • What The Clarity Act Means For Ripple And XRP Once Done

    0 shares
    Share 0 Tweet 0
  • 5 Things to Know About the Seen Mastercard

    0 shares
    Share 0 Tweet 0

Latest News

I settled my father’s estate, but found a will deeding a mobile home to his stepson. Am I ethically and legally obliged to fix this?

I settled my father’s estate, but found a will deeding a mobile home to his stepson. Am I ethically and legally obliged to fix this?

February 7, 2026
0

“I understand that I must initiate probate in his state of residence.”

Nvidia CEO says AI data center spending will last 7–8 years amid $650B capex boom

Nvidia CEO says AI data center spending will last 7–8 years amid $650B capex boom

February 7, 2026
0

Nvidia CEO Jensen Huang pushed back on investor concerns about overbuilding data center capacity, calling the current wave of AI...

US signals crackdown on compounded weight-loss drugs; Hims shares tumble

US signals crackdown on compounded weight-loss drugs; Hims shares tumble

February 7, 2026
0

US signals crackdown on compounded weight-loss drugs; Hims shares tumble

How EU Regulators Might Change TikTok

How EU Regulators Might Change TikTok

February 7, 2026
0

If you've ever joined me in the misfortune of downloading TikTok, you've probably spent at least one evening mindlessly scrolling...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.