A new variant of the Play ransomware, specifically designed for Linux, has emerged and is targeting VMware ESXi systems. This variant is notable because it encrypts virtual machine files, including disks, configurations, and metadata, and appends them with the ".PLAY" extension. It also drops a ransom note in the root directory. The Play ransomware group appears to be utilizing services from Prolific Puma, a provider of illicit link-shortening services, to aid in evading detection while spreading malware. They employ a Registered Domain Generation Algorithm (RDGA) to create new domain names, a technique becoming popular among various cybercriminal groups for activities like phishing, spamming, and malware distribution. The RDGA allows for the creation of numerous domain names, making it harder to detect and defend against compared to traditional DGAs. This Linux variant of Play represents a broader attack strategy across the Linux platform, potentially expanding the group's victim base and increasing the success rate of ransom negotiations. The Play ransomware, initially appearing in June 2022, is known for its double extortion tactic, encrypting systems after stealing sensitive data and demanding a ransom for decryption. As of October 2023, estimates suggest around 300 organizations worldwide have fallen victim to this ransomware group. The discovery of this Linux variant was made from a RAR archive file found on an IP address associated with tools previously used in Play ransomware attacks, indicating that the Linux version may follow similar tactics.
https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html
#cybersecurity #vmware #esxi #linux #playransomware #ransomware #attack #encryption #prolificpuma #rdga #dga #trendmicro