Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files

Posted on August 12, 2025August 12, 2025 By CWS

A newly found ransomware marketing campaign has focused enterprise VMware ESXi environments with navy precision, deploying custom-built encryption instruments that particularly hunt for digital machine disk information throughout VMFS datastores. 

Safety researchers have efficiently reverse-engineered the assault methodology and developed breakthrough decryption strategies, revealing vital vulnerabilities within the risk actors’ cryptographic implementation that enabled full information restoration with out ransom fee.

Key Takeaways1. DarkBit ransomware targets VMware ESXi servers.2. Makes use of AES-128-CBC encryption with RSA-2048 keys.3. Researchers broke encryption with out ransom fee.

DarkBit Ransomware Assaults

Profero Incident Response Group stories that the DarkBit cybercriminal group launched a coordinated assault towards VMware ESXi servers, deploying a complicated C++-based ransomware device particularly designed to encrypt digital machine disk photographs. 

The malware, recognized as esxi.darkbit (SHA256: 0bb1d29ede51d86373e31485d0e24701558e50856722357372518edfb98265a1), systematically focused VMFS datastores throughout enterprise environments.

The attackers utilized esxcli instructions to make sure all digital machines had been stopped earlier than starting the encryption course of. 

The ransomware then forked a number of processes to encrypt information concurrently, particularly concentrating on extensions together with .vmdk, .vmx, .nvram, and different VMware-specific file codecs. 

Every encrypted file obtained the .DARKBIT extension, rendering vital enterprise techniques inoperable.

Safety researchers found the malware implements AES-128-CBC encryption utilizing the widely-deployed Crypto++ cryptography library. 

Ultimate Encrypted Knowledge

The ransomware generates distinctive AES keys and initialization vectors (IV) for every file, with the symmetric keys subsequently encrypted utilizing a hardcoded RSA-2048 public key embedded throughout the binary.

The malware’s execution requires particular command-line parameters: ./esxi . 

Throughout evaluation, researchers discovered the encryption course of intentionally skips parts of bigger information—encrypting 0x100000-byte chunks whereas skipping 0xa00000 bytes for information underneath 6.55MB, and utilizing calculated skip sizes for bigger information based mostly on (FILESIZE / 0x32) – 0x200000.

Important vulnerabilities emerged within the random quantity generator implementation, which seeds utilizing the present timestamp, course of PID, and two stack addresses, making a finite keyspace of roughly 2^39 doable values.

Decryption Through Cryptographic Evaluation

Incident response groups efficiently exploited weaknesses within the ransomware’s cryptographic implementation to get well encrypted information with out paying ransom calls for. 

Researchers leveraged the recognized VMDK file header construction to carry out focused brute-force assaults towards the AES keys, using high-performance computing assets to systematically check key mixtures.

The breakthrough got here by way of recognizing that VMDK information comprise predictable magic bytes of their headers, enabling a cryptanalysis assault towards the AES-128-CBC first block when roughly 50 bits of plaintext had been recognized. 

Moreover, investigators found that many vital information remained accessible by strolling the interior VMDK filesystems, because the sparse nature of digital disk information left substantial information unencrypted.

The profitable restoration highlighted basic implementation flaws within the DarkBit ransomware, demonstrating that refined encryption algorithms develop into weak when improperly carried out with weak random quantity era and predictable seed values.

Equip your SOC with full entry to the newest risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, DarkBit, Deploy, Encrypt, ESXi, Files, Hackers, Ransomware, Servers, VMDK, VMware

Post navigation

Previous Post: Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles
Next Post: Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors

Related Posts

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
Securing IoT Devices in the Enterprise Challenges and Solutions Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
  • Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
  • DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
  • Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News