The Cybersecurity and Infrastructure Security Agency and FBI yesterday released guidance to help organizations prevent and recover from a global ransomware campaign that has compromised over 3,800 VMware ESXi servers. The campaign exploits known vulnerabilities in the servers to deploy ransomware that encrypts the configuration files and may render virtual machines unusable. Among other actions, the agencies encourage organizations managing VMware ESXi servers to update to the latest software and ransomware victims to run a CISA script that may help them recover their files.

John Riggi, AHA’s national advisor for cybersecurity and risk, said, “As we continue to leverage network- and internet-connected technologies, such as virtual machines that take the place of traditional desktops, we also expand our digital attack surface. In this instance, significant vulnerabilities in the VMware ESXi software were quickly identified and leveraged by our cyber adversaries to conduct disruptive ransomware attacks, known as the ESXiArgs ransomware campaign. Once again, it’s a race to patch before our adversaries exploit the identified vulnerabilities. It is encouraging to see that CISA, working with the cybersecurity community, has developed a potential solution (https://github.com/cisagov/ESXiArgs-Recover) to recover virtual machines struck by this ransomware – which will hopefully prevent payment of ransoms. If your organization becomes victim of any cyber or ransomware attack, we strongly encourage immediate notification to the FBI and CISA. I am also available to assist your organization and provide direct access to trusted contacts at FBI, CISA and other government agencies.”

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.

Related News Articles

Headline
Microsoft Sept. 16 announced it had disrupted a growing phishing service that had targeted at least 20 U.S. health care organizations. The company said it used…
Headline
The FBI Sept. 12 released an alert warning of malicious activities by cybercriminal groups UNC6040 and UNC6395, which the agency said are responsible for an…
Headline
The Cybersecurity and Infrastructure Security Agency, National Security Agency and international agencies Sept. 3 released joint guidance outlining a “software…
Headline
Chinese state-sponsored cyber actors are maliciously targeting networks globally, including telecommunications, government and others, according to a joint…
Headline
The FBI Aug. 20 released an advisory warning of malicious activity by Russian cyber actors targeting end-of-life devices running an unpatched vulnerability in…
Headline
The Cybersecurity and Infrastructure Security Agency, Environmental Protection Agency, National Security Agency, FBI and international agencies Aug. 13…