Lockbit Linux ESXi Ransomware: Evasion Techniques and File Encryption Process

A recent analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has revealed advanced evasion techniques. The malware uses the ptrace system call to detect debuggers, exiting if one is found, complicating dynamic analysis.


It deobfuscates strings with a rolling XOR routine, exposing critical elements like help menus and ransom notes. The control flow is managed through an argv parsing function, allowing configurations for encryption thresholds and logging modes.


ESXi-Specific Operations
The malware features robust logging and uses libc’s daemon function for persistence. It verifies ESXi tools before enabling SSH and encrypts files by suspending VMs and generating a 128-bit random key sealed with a hardcoded public key. The core encryption method is an optimized AES variant.
Post-encryption, ransom notes titled !!!-Restore-My-Files-!!! are dropped, highlighting the evolving threat of Linux ransomware.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security
- Other (43)
- Ransomware (162)
- Events and News (27)
- Features (45)
- Security (492)
- Tips (79)
- Google (35)
- Achievements (12)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (55)
- Malware Alerts (248)
- Cyber Attack (327)
- Data Backup (14)
- Data Breach (159)
- Phishing (172)
- Securty Tips (3)
- Browser Hijack (21)
- Adware (15)
- Email And Password (74)
- Android Security (83)
- Knoweldgebase (38)
- Botnet (19)
- Updates (4)
- Alert (71)
- Hacking (76)
- Social Media (9)
- vulnerability (96)
- Hacker (51)
- Spyware (14)
- Windows (12)
- Microsoft (32)
- Uber (1)
- YouTube (2)
- Trojan (6)
- Website hacks (10)
- Paytm (1)
- Credit card scam (4)
- Telegram (4)
- RAT (9)
- Bug (3)
- Twitter (2)
- Facebook (10)
- Banking Trojan (13)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (12)
- IoT Security (3)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (3)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (3)
- Cloud storage (2)
- Financial fraud (75)
- Impersonation phishing (1)
- DDoS (9)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (64)
-
Mobile Frauds
(26)
- WhatsApp (8)