Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Royal Ransomware, a new ransomware strain, is the latest malware to add encrypting capabilities to its variants, specifically targeting VMware ESXi virtual machines. It is a ransomware-as-a-service (RaaS) model, which is executed without parameters and starts encrypting all files in the / directory. The malware also comes with support for multiple flags that give the ransomware operators some control over the encryption process. Detection score on VirusTotal has increased as anti-malware solutions have started to detect the malware, and it is currently targeting organizations in the Healthcare and Public Healthcare (HPH) sectors.
The discovery of the new Linux Royal Ransomware variant by Will Thomas of the Equinix Threat Analysis Center (ETAC) highlights the importance of ongoing research and monitoring for new and emerging threats in the cybersecurity landscape.
The new Linux Royal Ransomware variant has support for multiple flags that give attackers more control over the encryption process. The flags allow the attackers to target virtual machines specifically and stop them from running to encrypt the data. The purpose of the “fork” and “logs” flags is currently unknown. The “id” flag requires an identifier that must be 32 characters in length, but its purpose is also unknown at this time. The presence of these flags highlights the evolving nature of ransomware threats and the need for organizations to stay informed and implement strong cybersecurity measures to protect their systems and data.
The ransomware will append the .royal_u extension to all encrypted archives in the VM when encrypting them.
The threat actors behind Royal ransomware were previously involved in the Conti ransomware operation. The malicious actors behind Royal ransomware use a form of intermittent encryption tactic to speed their encryption process, which is executed using the command line and has support for multiple flags that give the ransomware operators some control over the encryption process.
After emerging in January 2022, Royal ransomware is being distributed mainly by U.S. threat actors, primarily via malicious attachments and malicious advertisements. The strain is demanding ransom payments ranging from $250,000 to tens of millions of dollars after encrypting their targets’ enterprise network systems. Anti-malware solutions have started to detect the strain, but it is still being detected by 23 out of 62 malware scanning engines on VirusTotal.
Ransomware operators have found a new target in recent months – VMware’s ESXi virtual machines. With the increasing popularity of virtual machines among enterprises due to their improved device management capabilities and efficient resource handling, these groups have shifted their focus to VMs. After deploying their payloads on ESXi hosts, the ransomware operators use a single command to encrypt multiple servers. This can be extremely damaging to businesses, as it can disrupt their operations and potentially cause major losses in terms of data and revenue.
To prevent these attacks, organizations should ensure that their VMs are properly secured and updated with the latest security patches. VMs should also be monitored regularly to detect any suspicious activities or malicious code. Additionally, companies should implement a robust backup solution to ensure that if a ransomware attack is successful, they will still be able to recover their data. Finally, they should also use anti-ransomware solutions such as anti-malware software to protect themselves from these malicious threats.
It’s important to note that no single remediation measure can provide complete protection against ransomware, and organizations should implement a combination of measures to help defend against these types of attacks.