• Skip to main content

Naga Cyber Defense

Trusted Security for all of Indonesia

  • Home
  • About
  • Programs
  • Contact
  • Blog
You are here: Home / News / Versi Linux dari Royal Ransomware menargetkan server VMware ESXi

Versi Linux dari Royal Ransomware menargetkan server VMware ESXi

February 6, 2023 by Søren

Royal Ransomware adalah operasi ransomware terbaru untuk menambahkan dukungan untuk mengenkripsi perangkat Linux ke varian malware terbarunya, yang secara khusus menargetkan mesin virtual VMware ESXi.

BleepingComputer telah melaporkan tentang enkripsi ransomware Linux serupa yang dirilis oleh beberapa geng lain, termasuk Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, dan Hive.

Varian Linux Royal Ransomware baru ditemukan oleh Will Thomas dari Pusat Analisis Ancaman Equinix (ETAC), dan dijalankan menggunakan baris perintah.

Itu juga dilengkapi dengan dukungan untuk beberapa tanda yang akan memberi operator ransomware kendali atas proses enkripsi:

  • -stopvm > menghentikan semua VM yang sedang berjalan agar dapat dienkripsi
  • -vmonly – Hanya mengenkripsi mesin virtual
  • -fork – tidak diketahui
  • -log – tidak diketahui
  • -id: id harus 32 karakter

Saat mengenkripsi file, ransomware akan menambahkan ekstensi .royal_u ke semua file terenkripsi di VM.

Sementara solusi anti-malware memiliki masalah dalam mendeteksi sampel Royal Ransomware yang menggabungkan kemampuan penargetan baru, mereka sekarang terdeteksi oleh 23 dari 62 mesin pemindai malware di VirusTotal.

Royal Ransomware adalah operasi pribadi yang terdiri dari pelaku ancaman berpengalaman yang sebelumnya bekerja dengan operasi ransomware Conti

Mulai bulan September, Royal meningkatkan aktivitas jahat beberapa bulan setelah pertama kali ditemukan pada Januari 2022.

Meskipun awalnya mereka menggunakan enkripsi dari operasi lain, seperti BlackCat, mereka beralih menggunakan enkripsi mereka sendiri, dimulai dengan Zeon yang menjatuhkan catatan tebusan yang serupa dengan yang dihasilkan oleh Conti.

Pada pertengahan September, grup tersebut berganti nama menjadi “Royal” dan mulai menggunakan enkripsi baru dalam serangan yang menghasilkan catatan tebusan dengan nama yang sama.

Geng tersebut menuntut pembayaran tebusan mulai dari $250.000 hingga puluhan juta setelah mengenkripsi sistem jaringan perusahaan target mereka.

Selengkapnya: Bleeping Computer

Tagged With: Linux, Ransomware

Copyright © 2025 · Naga Cyber Defense · Sitemap

Cookies Settings
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
AcceptReject AllCookie Settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_172707709_11 minuteSet by Google to distinguish users.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
non-necessary
SAVE & ACCEPT
Powered by CookieYes Logo