Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files

Posted on August 12, 2025August 12, 2025 By CWS

A newly found ransomware marketing campaign has focused enterprise VMware ESXi environments with navy precision, deploying custom-built encryption instruments that particularly hunt for digital machine disk information throughout VMFS datastores. 

Safety researchers have efficiently reverse-engineered the assault methodology and developed breakthrough decryption strategies, revealing vital vulnerabilities within the risk actors’ cryptographic implementation that enabled full information restoration with out ransom fee.

Key Takeaways1. DarkBit ransomware targets VMware ESXi servers.2. Makes use of AES-128-CBC encryption with RSA-2048 keys.3. Researchers broke encryption with out ransom fee.

DarkBit Ransomware Assaults

Profero Incident Response Group stories that the DarkBit cybercriminal group launched a coordinated assault towards VMware ESXi servers, deploying a complicated C++-based ransomware device particularly designed to encrypt digital machine disk photographs. 

The malware, recognized as esxi.darkbit (SHA256: 0bb1d29ede51d86373e31485d0e24701558e50856722357372518edfb98265a1), systematically focused VMFS datastores throughout enterprise environments.

The attackers utilized esxcli instructions to make sure all digital machines had been stopped earlier than starting the encryption course of. 

The ransomware then forked a number of processes to encrypt information concurrently, particularly concentrating on extensions together with .vmdk, .vmx, .nvram, and different VMware-specific file codecs. 

Every encrypted file obtained the .DARKBIT extension, rendering vital enterprise techniques inoperable.

Safety researchers found the malware implements AES-128-CBC encryption utilizing the widely-deployed Crypto++ cryptography library. 

Ultimate Encrypted Knowledge

The ransomware generates distinctive AES keys and initialization vectors (IV) for every file, with the symmetric keys subsequently encrypted utilizing a hardcoded RSA-2048 public key embedded throughout the binary.

The malware’s execution requires particular command-line parameters: ./esxi . 

Throughout evaluation, researchers discovered the encryption course of intentionally skips parts of bigger information—encrypting 0x100000-byte chunks whereas skipping 0xa00000 bytes for information underneath 6.55MB, and utilizing calculated skip sizes for bigger information based mostly on (FILESIZE / 0x32) – 0x200000.

Important vulnerabilities emerged within the random quantity generator implementation, which seeds utilizing the present timestamp, course of PID, and two stack addresses, making a finite keyspace of roughly 2^39 doable values.

Decryption Through Cryptographic Evaluation

Incident response groups efficiently exploited weaknesses within the ransomware’s cryptographic implementation to get well encrypted information with out paying ransom calls for. 

Researchers leveraged the recognized VMDK file header construction to carry out focused brute-force assaults towards the AES keys, using high-performance computing assets to systematically check key mixtures.

The breakthrough got here by way of recognizing that VMDK information comprise predictable magic bytes of their headers, enabling a cryptanalysis assault towards the AES-128-CBC first block when roughly 50 bits of plaintext had been recognized. 

Moreover, investigators found that many vital information remained accessible by strolling the interior VMDK filesystems, because the sparse nature of digital disk information left substantial information unencrypted.

The profitable restoration highlighted basic implementation flaws within the DarkBit ransomware, demonstrating that refined encryption algorithms develop into weak when improperly carried out with weak random quantity era and predictable seed values.

Equip your SOC with full entry to the newest risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, DarkBit, Deploy, Encrypt, ESXi, Files, Hackers, Ransomware, Servers, VMDK, VMware

Post navigation

Previous Post: Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles
Next Post: Wikipedia Lost Legal Battle Against The UK’s Online Safety ACT Regulations

Related Posts

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data Cyber Security News
Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes Cyber Security News
Top 10 Best Brand Protection Solutions For Enterprises in 2025 Cyber Security News
Linux 6.16-rc4 Released With Fixes for Filesystem, Driver & Hardware Support Cyber Security News
Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cyber Security News
Chrome 142 Released With Fix for 20 Vulnerabilities that Allows Malicious Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods
  • Microsoft Highlights Security Risks Introduced by New Agentic AI Feature
  • Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details
  • Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
  • Mazda Says No Data Leakage or Operational Impact From Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods
  • Microsoft Highlights Security Risks Introduced by New Agentic AI Feature
  • Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details
  • Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
  • Mazda Says No Data Leakage or Operational Impact From Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark