Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
New Linux Ransomware Targets VMware ESXi: Admin Privileges Required, Files Locked
Researchers discovered a new Linux variant of TargetCompany ransomware that targets VMware ESXi environments. This sneaky malware ensures it has administrative privileges before encrypting files with VM-related extensions, leaving them with a “.locked” suffix. Oh, and it cleans up after itself too—talk about a tidy…

Hot Take:
Move over, Hollywood hackers—there’s a new villain in town, and it’s targeting your virtual machines with all the subtlety of a bull in a VMware shop!
Key Points:
- New Linux variant of TargetCompany ransomware targets VMware ESXi environments.
- Secures administrative privileges before executing malicious activities.
- Uses ‘uname’ command to detect VMware ESXi environment and creates “TargetInfo.txt” file.
- Encrypts VM-related files and appends the “.locked” extension.
- Deletes payload post-encryption to erase traces of the attack.