{"id":167897,"date":"2024-09-02T07:06:29","date_gmt":"2024-09-02T07:06:29","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=167897"},"modified":"2024-09-02T07:06:31","modified_gmt":"2024-09-02T07:06:31","slug":"a-new-variant-of-cicada-ransomware-targets-vmware-esxi-systems","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/167897\/cyber-crime\/a-new-variant-of-cicada-ransomware-targets-vmware-esxi-systems.html","title":{"rendered":"A new variant of Cicada ransomware targets VMware ESXi systems"},"content":{"rendered":"
<\/div>\n

A new ransomware-as-a-service (RaaS) operation called Cicada3301 has emerged in the threat landscape and already targeted tens of companies.<\/h2>\n\n\n\n

Cicada3301 is a new ransomware-as-a-service (RaaS) operation that appeared in the threat landscape. The group appears to be very active and already listed 23 victims on its extortion portal since mid-June. The following image shows the list of victims published by the gang on its Dark Web leak site.<\/p>\n\n\n\n

\"Cicada3301\"<\/a><\/figure>\n\n\n\n

<\/gwmw><\/gwmw>Cicada 3301<\/a>\u00a0is the name given to three sets of\u00a0puzzles<\/a>\u00a0posted under the name “3301” online between 2012 and 2014. The first puzzle started on January 4, 2012, on\u00a04chan\u00a0and ran for nearly a month. A second round of puzzles began one year later on January 4, 2013, and then a third round following the confirmation of a fresh clue posted on\u00a0Twitter\u00a0on January 4, 2014. The third puzzle has not been solved yet. The stated intent was to recruit “intelligent individuals” by presenting a series of puzzles to be solved; no new puzzles were published on January 4, 2015.<\/gwmw><\/p>\n\n\n\n

However, the operation seems to have no links with Cicada3301.<\/p>\n\n\n\n

Since June, the operators behind Cicada3301 have started recruiting affiliates on the RAMP cybercrime forum.<\/p>\n\n\n\n

The Cicada3301 ransomware is written in Rust and targets both Windows and Linux\/ESXi hosts. Truesec researchers dissected a variant that targets VMware ESXi systems, which appears to be a version of the same malware for Windows. The experts pointed out that while many ransomware groups are now targeting ESXi systems, only a few, including the now-defunct BlackCat\/ALPHV<\/a> group, have used Rust-based ransomware. Analysis reveals significant similarities between Cicada3301’s ransomware and the ALPHV ransomware.<\/gwmw><\/p>\n\n\n\n

“The Cicada3301 ransomware has several interesting similarities to the ALPHV ransomware.” reported<\/strong><\/a> Truesec.<\/em><\/p>\n\n\n\n