Source |
Network World |
Identifiant |
8308608 |
Date de publication |
2023-02-09 09:00:00 (vue: 2023-02-09 18:07:21) |
Titre |
VMware ESXi server ransomware evolves, after recovery script released |
Texte |
After the FBI and CISA on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.To read this article in full, please click here |
Envoyé |
Oui |
Condensat |
800 affected after aimed article attack attacks bare been cert cisa click computer current earlier emergency esxi evolved evolves fbi february first french full globally have here hypervisor ineffective instances made malware massive metal not older organizations patched please procedures public ransomware read recovery released reports response running said script server servers software some standards surfaced target targeting team those versions vmware way wednesday worldwide |
Tags |
Ransomware
Malware
|
Stories |
|
Notes |
★★★
|
Move |
|