Skip to content

New BlackByte Ransomware Variant Exploits VMware ESXi Vulnerability

BlackByte's new variant is causing significant disruption. It's exploiting a recent VMware ESXi vulnerability to quickly escalate privileges and target enterprise networks.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

New BlackByte Ransomware Variant Exploits VMware ESXi Vulnerability

Cybersecurity experts are warning about a new variant of BlackByte ransomware, which is demonstrating a high degree of customization and advanced anti-analysis measures. The group is exploiting a recently disclosed VMware ESXi vulnerability to target enterprise environments, causing significant disruption.

BlackByte, believed to be a spin-off of Conti, is leveraging the vulnerability (CVE-2024-37085) to gain full administrative access to ESXi hypervisors. This allows the group to quickly escalate privileges within compromised networks, often manipulating Active Directory domain objects and using 'Bring Your Own Vulnerable Driver' (BYOVD) techniques. The ransomware toolkit itself may have been developed by BlackByte.

Experts note that BlackByte's quick adaptation to emerging vulnerabilities poses significant challenges for cybersecurity defenders. The group's departure from traditional techniques, such as exploiting known vulnerabilities in widely used software or using phishing and brute-force attacks, further underscores the evolving nature of cyber threats.

To counter BlackByte's threats, cybersecurity experts recommend hardening and patching critical systems like ESXi, implementing multi-factor authentication (MFA), auditing VPN configurations, closely monitoring privileged access, and disabling unused vendor accounts. These measures can help protect against the seamless lateral movement, data exfiltration, and ransomware deployment that exploiting the ESXi vulnerability enables.

Read also:

Latest