\"\"
<\/span><\/figcaption><\/figure>New Delhi: Cyber-criminals are exploiting two-year-old vulnerability in Cloud software company VMware<\/a> for a massive-scale ransomware<\/a> attack.

France's computer emergency response team (
CERT-FR<\/a>) has warned that hackers have been targeting 'VMware ESXi<\/a>' servers since February 3.

Italy's
national cybersecurity agency<\/a> ACN<\/a> also warned of a large-scale ransomware campaign targeting thousands of servers across Europe and North America.

\"In the current state of investigations, these attack campaigns seem to have taken advantage of the exposure of ESXi hypervisors which would not have been updated with security patches quickly enough,\" said CERT-FR.

These vulnerabilities allow an attacker to remotely exploit arbitrary code.

According to a Census search, more than 3,200 VMware servers worldwide have been compromised by the ESXiArgs ransomware campaign.

France is the most affected country, followed by the US, Germany, Canada and the UK.

A VMware spokesperson told TechCrunch that patches for the vulnerability \"were made available to customers two years ago in VMware's security advisory of February 23, 2021.\"

\"Security hygiene is a key component of preventing ransomware attacks, and organisations who are running versions of ESXi impacted by CVE-2021-21974, and have not yet applied the patch, should take action as directed in the advisory,\" the spokesperson said.

The ransomware campaign is already causing \"significant\" damage due to the number of unpatched machines.

It's not yet clear who is behind the ransomware campaign.
<\/body>","next_sibling":[{"msid":97686484,"title":"Baidu to finish testing ChatGPT-style project 'Ernie Bot' in March","entity_type":"ARTICLE","link":"\/news\/baidu-to-finish-testing-chatgpt-style-project-ernie-bot-in-march\/97686484","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":97686716,"entity_type":"ARTICLE","title":"Hackers actively exploiting VMware bug in ransomware campaign","synopsis":"France's computer emergency response team (CERT-FR) has warned that hackers have been targeting 'VMware ESXi' servers since February 3.","titleseo":"telecomnews\/hackers-actively-exploiting-vmware-bug-in-ransomware-campaign","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":208,"shares":0,"engagementtimems":937000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2023-02-07 13:31:56","lastupd":"2023-02-07 13:36:32","breadcrumbTags":["vmware","cert-fr","VMware ESXi","national cybersecurity agency","acn","internet","cyber attack","ransomware"],"secinfo":{"seolocation":"telecomnews\/hackers-actively-exploiting-vmware-bug-in-ransomware-campaign"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2023-02-07" data-index="article_1">

黑客积极利用VMware bug ransomware运动

法国的计算机紧急响应小组(CERT-FR)警告称,黑客已经针对2月3日以来的VMware ESXi服务器。

  • 更新于2023年2月7日01:36点坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士
新德里:网络犯罪分子利用两岁的脆弱性在云软件公司VMware对于一个大规模ransomware攻击。

法国的计算机紧急响应小组(CERT-FR)警告称,黑客已经瞄准的VMware ESXi2月3日以来的服务器。

意大利的国家网络安全机构 ACN还警告称,大规模ransomware运动目标在欧洲和北美数千台服务器。

“在当前状态的调查,这些攻击活动似乎利用ESXi hypervisor的接触就不会用安全补丁更新速度不够快,“CERT-FR说。

广告
这些漏洞允许远程攻击者利用任意代码。

根据人口普查的搜索,全世界有超过3200的VMware服务器已经被ESXiArgs ransomware运动。

法国是受影响最严重的国家,紧随其后的是美国、德国、加拿大和英国。

VMware的一位发言人告诉TechCrunch补丁的漏洞”得到了客户两年前在VMware的安全咨询2月23日,2021年。”

“安全卫生防范ransomware的袭击是一个关键组成部分,和组织运行的版本ESXi影响cve - 2021 - 21974,还没有应用补丁,应该采取行动的指导顾问,”这位发言人说。

ransomware运动已经造成“重大”损害由于应用补丁的机器的数量。

尚不清楚是谁在ransomware运动。
  • 发布于2023年2月7日下午01:31坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序
\"\"
<\/span><\/figcaption><\/figure>New Delhi: Cyber-criminals are exploiting two-year-old vulnerability in Cloud software company VMware<\/a> for a massive-scale ransomware<\/a> attack.

France's computer emergency response team (
CERT-FR<\/a>) has warned that hackers have been targeting 'VMware ESXi<\/a>' servers since February 3.

Italy's
national cybersecurity agency<\/a> ACN<\/a> also warned of a large-scale ransomware campaign targeting thousands of servers across Europe and North America.

\"In the current state of investigations, these attack campaigns seem to have taken advantage of the exposure of ESXi hypervisors which would not have been updated with security patches quickly enough,\" said CERT-FR.

These vulnerabilities allow an attacker to remotely exploit arbitrary code.

According to a Census search, more than 3,200 VMware servers worldwide have been compromised by the ESXiArgs ransomware campaign.

France is the most affected country, followed by the US, Germany, Canada and the UK.

A VMware spokesperson told TechCrunch that patches for the vulnerability \"were made available to customers two years ago in VMware's security advisory of February 23, 2021.\"

\"Security hygiene is a key component of preventing ransomware attacks, and organisations who are running versions of ESXi impacted by CVE-2021-21974, and have not yet applied the patch, should take action as directed in the advisory,\" the spokesperson said.

The ransomware campaign is already causing \"significant\" damage due to the number of unpatched machines.

It's not yet clear who is behind the ransomware campaign.
<\/body>","next_sibling":[{"msid":97686484,"title":"Baidu to finish testing ChatGPT-style project 'Ernie Bot' in March","entity_type":"ARTICLE","link":"\/news\/baidu-to-finish-testing-chatgpt-style-project-ernie-bot-in-march\/97686484","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":97686716,"entity_type":"ARTICLE","title":"Hackers actively exploiting VMware bug in ransomware campaign","synopsis":"France's computer emergency response team (CERT-FR) has warned that hackers have been targeting 'VMware ESXi' servers since February 3.","titleseo":"telecomnews\/hackers-actively-exploiting-vmware-bug-in-ransomware-campaign","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":208,"shares":0,"engagementtimems":937000},"Alttitle":{"minfo":""},"artag":"IANS","artdate":"2023-02-07 13:31:56","lastupd":"2023-02-07 13:36:32","breadcrumbTags":["vmware","cert-fr","VMware ESXi","national cybersecurity agency","acn","internet","cyber attack","ransomware"],"secinfo":{"seolocation":"telecomnews\/hackers-actively-exploiting-vmware-bug-in-ransomware-campaign"}}" data-news_link="//www.iser-br.com/news/hackers-actively-exploiting-vmware-bug-in-ransomware-campaign/97686716">