Skip to content
  • Home
  • Services
    • Combo Plans
      • Shared Support
      • Semi Dedicated Support
      • Dedicated Support
    • Control Panel Support
      • DirectAdmin Support
      • cPanel Support
      • Plesk Support
    • Server Setup & Support
  • Products
    • Managed Migration
    • Nginx Support
    • Varnish Support
    • Shield
  • Careers
    • Internship Programme
  • KnowledgeBase
  • Contact Us
  • Blog
  • About Us

WHM-cPanel Control Panel

4
  • How to log in to cPanel?
  • How to find outdated services in cPanel
  • Exclude services from the outdated services script’s check in cPanel
  • catch-all accounts, and how to add that in cPanel

Email

3
  • How to install mail function on a Centos server.
  • SPF, DKIM, and DMARC records explained
  • How to configure an Email account manually on the Thunderbird client

SSL certificates

3
  • How to install SSL on nginx with Let’s Encrypt
  • SSL installation and renewal on an Nginx server
  • Installation of SSL in Haproxy and HTTP to HTTPS Redirection

Webservers

1
  • Enable GZIP compression in Nginx

Security

1
  • Disabling mail alerts from LFD

News

46
  • White House report on Open-source AI models
  • Linux Kernel 6.9 – End of Life
  • Verify if SystemD or not on Linux
  • SLUBStick: A Groundbreaking Kernel Exploitation Technique
  • Top 5 Linux Distros for Every User Level
  • Alpaca: The Open-Source AI Model for Linux Enthusiasts
  • Zero-Day Threat: The Risks of the IP Address Exploit
  • Intel Engineer Boosts Linux Kernel Boot Time by 0.035 Seconds
  • Canonical’s New Aggressive Kernel Policy: Ubuntu Releases
  • KDE Frameworks 6.5 Released: What’s New?
  • Ubuntu 24.10 to Feature the Latest Linux Kernel
  • Linux 6.11-rc3 Released: Performance Boosts and Key Fixes
  • The Open Model Initiative Joins the Linux Foundation
  • New Study Debunks Fears of AI Threats
  • AI-Powered Screenshot Search for Pixel 9 Devices
  • Fastfetch: A High-Performance Alternative to Neofetch
  • Containers: Efficient OS-Level Virtualization & Top Tools
  • Tails 6.6-Enhanced Security, Anonymity,Decentralized Features
  • Kubernetes 1.31 “Elli” Release: New Features and Updates
  • Unleashing the Power of Arch Linux with Archinstall 2.8.2
  • Deepin 23 Released with Atomic Updates and Broad CPU Support
  • Secure Your Linux Systems with Expert Cybersecurity
  • NGINX Fixes Buffer Overread Vulnerability (CVE-2024-7347)
  • Linux Kernel Flaw Lets Attackers Bypass CPU and Write to Memory
  • 0.0.0.0 Day Vulnerability:18-Year-Old Browser Flaw
  • CachyOS August 2024: Open NVIDIA Modules & COSMIC Desktop
  • Windows Update Breaks Linux Boot on Dual-Boot Systems
  • EasyOS 6.2 Released: Lightweight Linux Distro-New Features
  • Upstreaming Linux Kernel Support for Raspberry Pi 5
  • Canonical Pauses Ubuntu Kernel Updates Until October 2024
  • 9 Years of LVFS: Transforming Linux Firmware Updates
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
  • Red Hat OpenShift Lightspeed: AI Assistant for OpenShift
  • Linux 6.12 Introduces QR Code in DRM Panic Handler
  • Rust for Linux Maintainer Resigns Amid ‘Nontechnical Nonsense’
  • Ubuntu 24.10 to Feature Latest Linux 6.11 Kernel
  • LinkedIn Migrates from CentOS to Azure Linux
  • Linux 6.11-rc5 Released with Streamlined Bcachefs Fixes
  • AMD Preferred Core Fix Arrives Before Linux 6.11-rc6
  • Debian 12.7 Released: 55 Security Updates, 51 Bug Fixes
  • 4MLinux 46 Released: New Apps, LAMP Server Included
  • Cicada3301 Ransomware Targets VMware ESXi Systems
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
  • Sedexp Malware Evades Detection for Two Years on Linux
  • Minimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller
  • Manage Linux User Activity with Acct/Psacct

Operating System

1
  • CentOS 7 End-of-Life: What You Need to Know and How to Migrate
  • Home
  • KnowledgeBase
  • News
  • Cicada3301 Ransomware Targets VMware ESXi Systems
View Categories

Cicada3301 Ransomware Targets VMware ESXi Systems

2 min read

Cicada3301, a new ransomware operation, is quickly gaining attention by targeting VMware ESXi systems. This ransomware-as-a-service (RaaS) operation has already listed 19 victims on its extortion portal, showing its rapid rise in the cybercrime world.

CICADA3301

 

Cicada3301: Origins and Development #

Cicada3301 first appeared on the RAMP cybercrime forum on June 29, 2024, to recruit affiliates. However, reports indicate that the group began its attacks as early as June 6. This suggests that they operated independently before seeking affiliates.

Though it shares a name and logo with the infamous 2012-2014 online puzzle game, there’s no known connection between the two. Instead, Cicada3301 follows a pattern seen in other ransomware groups. They breach corporate networks, steal data, and encrypt devices. Victims then face double extortion. The ransomware operators use encryption keys and threats to leak stolen data to pressure victims into paying a ransom.

Links to ALPHV/BlackCat: A Possible Rebrand? #

Security researchers at Truesec have identified significant overlaps between Cicada3301 and the ALPHV/BlackCat ransomware. Both are written in Rust and use the ChaCha20 encryption algorithm. They also share operational similarities, such as VM shutdown and snapshot-wiping commands. This connection suggests that Cicada3301 may be a rebrand or a fork from former ALPHV members.

ALPHV performed an exit scam in March 2024, stealing $22 million from Change Healthcare. The timing of Cicada3301’s emergence, close to ALPHV’s shutdown, adds weight to the theory of a rebranded operation.

Cicada3301:Targeting VMware ESXi Systems #

Cicada3301’s focus on VMware ESXi systems sets it apart. The ransomware targets specific file extensions and uses intermittent encryption to evade detection. By using ESXi’s own commands, the ransomware shuts down virtual machines and deletes snapshots before encrypting the data. This approach disrupts operations and removes potential recovery options, increasing the pressure on victims to pay.

Strategic Design for Maximum Impact #

Cicada3301’s operations indicate expertise, likely from experienced threat actors. The ransomware can encrypt both Windows and Linux/VMware ESXi systems. Its strategic design to disrupt virtual machine operations underscores its effectiveness in high-impact attacks. By focusing on enterprise environments, Cicada3301 aims to cause maximum disruption, making it a significant threat.

Conclusion: A Growing Threat #

As Cicada3301 evolves, its links to past ransomware operations and focus on critical enterprise systems highlight the growing sophistication of cyber threats. Organizations must remain vigilant and adopt robust security measures to protect against this emerging danger.

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on September 2, 2024
Linux Kernel 6.9 – End of Life

Powered by BetterDocs

Table of Contents
  • Cicada3301: Origins and Development
  • Links to ALPHV/BlackCat: A Possible Rebrand?
  • Cicada3301:Targeting VMware ESXi Systems
  • Strategic Design for Maximum Impact
    • Conclusion: A Growing Threat

The last technical support you will ever need!

select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with  a level of expertise needed for growing your business!

Copyright 2025 techprovidence