esxicli<\/code> terminal and deleting snapshots.<\/li>\n<\/ul>\n\n\n\nThese functionalities provide flexibility in how the ransomware operates, potentially making it more effective in different scenarios.<\/gwmw><\/gwmw><\/p>\n\n\n\n
The Cicada3301 ransomware generates a symmetric key for encryption using the OsRng random number generator. The ransomware uses a function called encrypt_file<\/code> to handle file encryption. This process involves extracting a public PGP key stored in the binary’s data section, which is used to encrypt the generated symmetric key.<\/p>\n\n\n\n
Then the malware creates a note titled “RECOVER-[encrypted file ending]-DATA.txt” in each folder containing encrypted files. The encryption targets specific file extensions, mostly related to documents and pictures, suggesting the ransomware was initially designed to target Windows systems before being adapted for ESXi hosts.<\/gwmw><\/p>\n\n\n\n