Thursday, February 6, 2025
Homecyber securityAbyss Locker Ransomware Attacking Critical Network Devices including ESXi servers

Abyss Locker Ransomware Attacking Critical Network Devices including ESXi servers

Published on

SIEM as a Service

Follow Us on Google News

The Abyss Locker ransomware, a relatively new but highly disruptive cyber threat, has been actively targeting critical network devices, including VMware ESXi servers, since its emergence in 2023.

This ransomware group employs sophisticated tactics to infiltrate corporate networks, exfiltrate sensitive data, and encrypt systems for financial extortion.

Its focus on virtualized environments has made it a significant concern for enterprises relying on VMware ESXi for hosting virtual machines.

Sophisticated Attack Flow

Abyss Locker’s attack flow begins with exploiting vulnerabilities in edge devices, such as unpatched VPN appliances.

For instance, known flaws like CVE-2021-20038 in SonicWall VPNs have been leveraged to gain initial access.

Once inside the network, the attackers deploy tunneling tools and malware on critical devices to maintain persistence and evade detection.

Key targets include network-attached storage (NAS) systems and VMware ESXi servers.

On ESXi servers, the ransomware exploits administrative credentials or known vulnerabilities to enable SSH access if disabled.

Using the native SSH binary, attackers establish reverse SSH tunnels to their command-and-control (C2) servers.

This allows them to pivot within the network and conduct reconnaissance while avoiding detection.

The resilience of ESXi appliances makes them ideal for maintaining semi-persistent backdoors.

The ransomware also employs a Linux ELF encryptor tailored for VMware ESXi systems.

This encryptor uses the esxcli command-line tool to list and terminate virtual machines before encrypting associated files such as virtual disks (.vmdk), snapshots (.vmsn), and metadata (.vmsd).

Encrypted files are appended with a .crypt extension, and ransom notes are left under filenames like README_TO_RESTORE.

Double Extortion and Data Exfiltration

Abyss Locker follows a double-extortion model, where stolen data is used as leverage to pressure victims into paying ransoms.

Threat actors have reportedly exfiltrated data volumes ranging from 35 GB to 700 GB per victim.

The stolen data is listed on their Tor-based leak site, “Abyss-data,” threatening public exposure if demands are unmet.

For data exfiltration, the group uses tools like Rclone, renamed to evade detection (e.g., ltsvc.exe).

Abyss Locker Ransomware
help documentation for ‘ltsvc.exe’ showing identical content to that of RClone.

These tools selectively target specific file types for transfer to cloud storage services such as AWS or BackBlaze.

To bypass security measures, Abyss Locker disables endpoint protection tools like Windows Defender and removes EDR agents using techniques such as Bring Your Own Vulnerable Driver (BYOVD).

Organizations can mitigate the risk of Abyss Locker attacks by implementing robust security measures:

  • Patch Management: Regularly update VPN appliances and other edge devices to address known vulnerabilities.
  • Network Segmentation: Isolate critical infrastructure into separate VLANs with strict firewall rules.
  • Endpoint Protection: Enable tamper protection for EDR solutions and restrict installation of unsigned drivers.
  • Backup Security: Use immutable storage solutions and isolate backups from production networks.

Monitoring tools should be configured to detect anomalies in SSH activity, unauthorized access attempts on ESXi servers, and rapid file changes indicative of ransomware behavior.

According to the Sygnia report, the Abyss Locker ransomware exemplifies the growing sophistication of cyberattacks targeting virtualized environments.

Its focus on VMware ESXi servers underscores the need for enterprises to adopt proactive defense strategies and enhance monitoring capabilities to safeguard their critical infrastructure from such evolving threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...

Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users

A new wave of phishing attacks is leveraging Scalable Vector Graphics (SVG) files to...

Flesh Stealer Malware Attacking Chrome, Firefox, and Edge Users to Steal Passwords

A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat...

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

The cybersecurity landscape faces a new challenge with the emergence of Nova Stealer, a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...

Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users

A new wave of phishing attacks is leveraging Scalable Vector Graphics (SVG) files to...

Flesh Stealer Malware Attacking Chrome, Firefox, and Edge Users to Steal Passwords

A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat...