Ransomware Evolution: New Linux Variant Targets VMware ESXi with Vicious Precision

A new Linux variant of TargetCompany ransomware, targeting VMware ESXi environments, has emerged. This malware, also known as Mallox, FARGO, and Tohnichi, uses a custom shell script to deliver payloads and encrypt files, marking an evolution in their ransomware operations. Stay vigilant and update your…

Hot Take:

Looks like ransomware gangs are getting a Linux education! TargetCompany, a.k.a. Mallox, FARGO, and Tohnichi, has graduated to attacking VMware ESXi environments with a custom shell script. Guess they got tired of playing in Windows’ sandbox and decided to take a stroll on the Linux wild side!

Key Points:

  • TargetCompany ransomware, also known as Mallox, FARGO, and Tohnichi, now has a Linux variant targeting VMware ESXi environments.
  • This new variant uses a custom script to deliver and execute payloads, exfiltrating data to multiple servers for redundancy.
  • Ransomware checks for VMware ESXi by looking for ‘vmkernel’ and encrypts VM-related files, appending a ‘.locked’ extension.
  • A ransom note, “HOW TO DECRYPT.txt,” is left with instructions for victims to pay up and get a decryption key.
  • Trend Micro attributes the attacks to an affiliate named “vampire,” with IP addresses traced back to an ISP in China.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here