New RansomHouse Tool ‘MrAgent’ Streamlines Ransomware Attacks on VMware ESXi Hypervisors

by | Feb 16, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

The RansomHouse ransomware operation has unveiled a new tool called ‘MrAgent,’ designed to streamline the deployment of its data encrypter across multiple VMware ESXi hypervisors. RansomHouse, a ransomware-as-a-service (RaaS) operation known for its double extortion tactics, has been targeting large organizations since its emergence in December 2021.

Targeting ESXi Servers:

Ransomware groups often target ESXi servers due to their deployment of virtual computers containing valuable data, such as critical applications and services like databases and email servers. Trellix analysts have identified a new binary used in RansomHouse attacks, specifically tailored for targeting ESXi systems.

RansomHouse's victims' sizeRansomHouse’s victims sizes and counts (Trellix)

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

MrAgent’s Functionality

MrAgent’s primary function is to identify host systems, disable their firewalls, and automate the ransomware deployment process across multiple hypervisors simultaneously, compromising all managed virtual machines (VMs). The tool supports custom configurations for ransomware deployment received directly from the command and control (C2) server

A typical configuration exampleTypical MrAgent configuration (Trellix)

Windows Version and Adaptations

Trellix has also discovered a Windows version of MrAgent, featuring OS-specific adaptations such as the use of PowerShell for certain tasks.This cross-platform capability demonstrates RansomHouse’s intent to maximize the impact of their campaigns across different operating systems.




Security Implications and Defense Measures

The automation of manual steps in attacks like these underscores the threat posed by ransomware operations to large networks. Defenders must implement comprehensive security measures, including regular software updates, strong access controls, network monitoring, and logging, to mitigate the risks posed by tools like MrAgent.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This