IT Strategy & Insights

37000 VMware Servers Under Attack

37,000 VMware Servers Under Attack: Urgent Action Required to Prevent Massive Security Breach

Imagine waking up and realizing your company’s critical data—financial records, sensitive client information, and proprietary intellectual property—is gone, held hostage by cyber attackers. This nightmare is precisely what over 37,000 VMware ESXi server administrators are facing, as their servers now stand vulnerable to actively exploited exploits and ransomware attacks.

ESXiArgs Ransomware Attack: Targeting Thousands of Unpatched VMware ESXi Servers

Recent cyber intelligence from multiple researchers has revealed an increasing number of ransomware attacks targeting VMware ESXi servers, particularly through the ESXiArgs ransomware campaign. Cybercriminals are leveraging vulnerabilities in older, unpatched versions of VMware ESXi software, putting thousands of organizations at immediate risk.

Due to an outdated security posture, more than 37,000 VMware ESXi servers remain publicly accessible and vulnerable, according to cybersecurity initiative data by Censys. Cyber criminals exploit older VMware ESXi version vulnerabilities, primarily CVE-2021-21974, to infiltrate systems and launch devastating ransomware attacks.

Why VMware ESXi Servers Are Being Targeted

VMware ESXi is a widely used virtualization platform that enables businesses worldwide to run numerous virtual machines from a single host server. Given its extensive adoption by organizations, especially for critical infrastructure, attackers perceive VMware ESXi servers as high-value targets.

Cyber attackers exploit a known security flaw (CVE-2021-21974), impacting the OpenSLP service within VMware’s ESXi servers. When unpatched, this flaw allows attackers to remotely execute code on the server and deploy malware, like the currently active ESXiArgs ransomware, encrypting files on both servers and virtual machines.

The Scale of the Threat: Troubling Numbers and Facts

According to Censys researchers, as of their most recent survey:

  • Over 37,000 servers across the globe remain vulnerable to exploitation through CVE-2021-21974.
  • Europe leads with many impacted servers, followed by North America and Asia.
  • The security flaw was announced and patched nearly two years ago, yet tens of thousands of servers are still outdated and vulnerable.
  • Such widespread neglect significantly amplifies the potential damages of this ransomware campaign, posing immediate risks to organizational operations, data security, and business continuity.

    Immediate Actions Needed to Mitigate VMware Server Risks

    Organizations using VMware ESXi must act swiftly to ensure security. Implement the following immediate and necessary actions:

  • Immediate patching: Apply the latest VMware patches immediately to address known vulnerabilities (especially CVE-2021-21974).
  • Disable Unused Services: Turn off services like OpenSLP if not actively used, drastically reducing exposure to the threat.
  • Network Routing and Isolation: Restrict external access to these servers as much as possible, isolating vulnerable instances from the internet.
  • Backup Procedures: Regularly back up critical server data securely offline to minimize damage if attacked.
  • What’s at Stake: Avoiding Costly Consequences

    Failing to act immediately leaves organizations vulnerable to:

  • Significant financial costs due to downtime and ransom payments.
  • Irrecoverable loss of sensitive or proprietary information.
  • Damage to customer relationships and business reputation, which can take years to recover.
  • Possible legal implications and regulatory fines due to non-compliance with data security standards.
  • Conclusion: The Time to Act is Now

    This VMware ESXi ransomware wave is a stark reminder that old vulnerabilities remain dangerous threats if left unaddressed. The risks are severe, with ransomware attackers actively seeking out and exploiting vulnerable servers. Organizations must immediately protect themselves and their customers by patching systems and employing proactive security practices.

    Remember, security is not set-it-and-forget-it; it’s an ongoing, continuous process requiring engagement, awareness, and action. If your servers remain vulnerable, attackers will find you—so take immediate action today.

    Move forward with Keystone IT Connect