ESXiArgs Ransomware Attack: A Tug-of-War Between Cybercriminals and Cybersecurity

Share This Post

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have released a recovery script for organizations affected by a ransomware attack targeting VMWare ESXi servers worldwide. The attacks first made public on February 3rd by the French Computer Emergency Response Team (CERT-FR), are aimed at VMware’s ESXi bare metal hypervisor and target instances running older versions of the software or those that have not been patched to current standards. The ransomware encrypts configuration files on vulnerable virtual machines, making them potentially unusable. CISA and the FBI have released a recovery script that doesn’t delete the affected configuration files, but attempts to create new ones. However, a new version of the ransomware has been reported that makes earlier recovery procedures ineffective. CISA and the FBI recommend that affected organizations follow certain security procedures, including patching the machines to the latest standard and shutting down the Service Location Protocol service.

https://www.networkworld.com/article/3687610/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.html

https://www.bleepingcomputer.com/news/security/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery/

https://www.zdnet.com/article/vmware-warns-of-esxiargs-ransomware-attacks-on-unpatched-esxi-hypervisors/



Reach out to our incident response team for help

More To Explore

Information Security News – 1/26/2026

The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time Article Link: https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/ NIST, MITRE Announce $20 million Research

Information Security News – 1/5/2026

The 10 Biggest Cyber Stories of 2025: A Year of Record-Breaking Attacks Article Link: https://www.probablypwned.com/article/top-10-cyber-stories-2025-year-in-review The Evolution of Information Security: From Compliance to Resilience Article

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.