{"id":18762,"date":"2021-06-30T17:11:47","date_gmt":"2021-06-30T17:11:47","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18762"},"modified":"2021-09-07T23:48:15","modified_gmt":"2021-09-07T23:48:15","slug":"ransomware-groups-target-virtual-machines-vms","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/","title":{"rendered":"Ransomware Groups are Targeting VMs"},"content":{"rendered":"<p>Virtual machines are becoming an increasingly popular avenue cybercriminals are taking to distribute their <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> payloads onto compromised corporate networks.<\/p>\n<p>Bad actors have been exploiting VMs in recent years as a way of running under the radar, making it more difficult to detect their malware while it encrypts the data they intend to hold for ransom. Security analysts at Sophos\u2019 Managed Threat Response unit last year detailed some campaigns that used VMs to hide their malicious payloads.<\/p>\n<p>More recently, Yelisey Boguslavskiy, a security researcher with cybersecurity firm Advanced Intel, earlier this month found that the high-profile ransomware group REvil is using a Linux encryptor that leverages VMware ESXi VMs and also can work on network-attached storage (NAS) systems. Also this month, security researchers at Symantec, while investigating an attempted ransomware attack, found that the attackers had used a VirtualBox VM \u2013 which is legitimate virtual machine software developed by Oracle \u2013 to help spread its malicious code.<\/p>\n<p>\u201cSymantec has found evidence that an increasing number of ransomware attackers are using virtual machines (VMs) in order to run their ransomware payloads on compromised computers,\u201d the researchers from the company\u2019s Threat Hunter Team wrote in a <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/ransomware-virtual-machines\">blog post<\/a>. \u201cThe motivation behind the tactic is stealth. In order to avoid raising suspicions or triggering <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus software<\/a>, the ransomware payload will \u2018hide\u2019 within a VM while encrypting files on the host computer.\u201d<\/p>\n<h2>A Growing Trend<\/h2>\n<p>Sophos researchers last year found that <a href=\"https:\/\/trends\/.sophos.com\/en-us\/2020\/05\/21\/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security\/\">Ragnar Locker ransomware<\/a> was deployed inside a VirtualBox Windows XP virtual machine to conceal its payload. The bad actors behind the <a href=\"https:\/\/trends\/.sophos.com\/en-us\/2020\/09\/17\/maze-attackers-adopt-ragnar-locker-virtual-machine-technique\/\">Maze ransomware<\/a> later used a similar technique that used a full installation of Windows 7 running inside a VirtualBox.<\/p>\n<p>\u201cThe Maze threat actors have proven to be adept at adopting the techniques demonstrated to be successful by other ransomware gangs, including\u00a0<a href=\"https:\/\/trends\/.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-the-evasion-arms-race\/\">the use of extortion<\/a>\u00a0as a means to extract payment from victims,\u201d they wrote. \u201cAs <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint protection products<\/a> improve their abilities to defend against ransomware, attackers are forced to expend greater effort to make an end-run around those protections.\u201d<\/p>\n<p>Symantec analysts were unable to identify the payload in the VM, but they suspected it was the Conti ransomware, which has been responsible for such attacks as the one last month on the Irish healthcare system, where the group demanded $20 million in ransom. At the same time, Symantec noted that Mount Locker ransomware was found on the same computer that the VM was deployed on, though because \u201cthe main purpose of running a payload on a VM is to avoid detection, it doesn\u2019t make much sense for the attacker to also deploy the payload on the host computer.\u201d<\/p>\n<p>A possibility is that the attacker is an \u201caffiliate operator\u201d who has access to both Conti and Mount Locker, the researchers said.<\/p>\n<h2>An Evolving Field<\/h2>\n<p>Attackers leveraging ransomware and other techniques are constantly evolving their methodologies to keep a step ahead of the latest detection and prevention efforts. Cybersecurity vendor McAfee, in its first-quarter threat report this month, noted that bad actors are increasingly turning to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service (RaaS) campaigns<\/a>. They are shifting away from wide-reaching multi-target ransomware attacks that tend to come with low returns and instead are using more targeted RaaS campaigns aimed at fewer but larger organizations and that come with larger ransom demands.<\/p>\n<p>The use of virtual machines is another adaptation to avoid detection. Enterprises continue to adopt VMs to make device management, resource use and data backup easier and more efficient. Leveraging them gives attackers another way to deliver their ransomware payloads.<\/p>\n<p>\u201cMany are now heavily relying on legitimate and dual-use tools in order to stage attacks on targeted networks,\u201d Symantec researchers wrote. \u201cThe ransomware payload itself is often the stage of the attack most likely to raise red flags and, by hiding it in a virtual machine, there is an expectation that it may not be discovered. Organizations should exercise increased vigilance in relation to the unauthorized installation of virtual machines on their networks.\u201d<\/p>\n<h2>Digital Transformation Increases Attack Surface<\/h2>\n<p>As organizations continue to digitize their businesses, they will continue to increasingly move their infrastructures to VMs and hybrid cloud environments to increase their flexibility and drive down costs, Karl Steinkamp, director of PCI product and quality assurance at cybersecurity services provider Coalfire, told <em>eSecurity Planet<\/em>. REvil upgrading its platform to target Linux ESXi hosts \u201cwould enable bad actors to go after Linux systems on multiple clouds in addition to targeting on-premise systems,\u201d Steinkamp said. \u201cIt\u2019s an unfortunate but expected outcome given the popularity of cloud offerings.\u201d<\/p>\n<p>Sean Nikkel, senior cyber threat intel analyst at cybersecurity company Digital Shadows, noted that ESXi has been the target of various ransomware groups, including RansomEXX, DarkSide and Babuk Locker, as well as the Maze group.<\/p>\n<p>\u201cAdversaries have been attacking virtual machines for years prior to these incidents,\u201d Nikkel told <em>eSecurity Planet<\/em>. \u201cIf nothing else, it&#8217;s a growth in capability for an already active and prolific group, with some interesting features. It&#8217;s realistically possible we&#8217;ll continue to see other groups mirror these developments or improve their own wares. A virtual machine typically has the same software running as a physical server, and if it&#8217;s vulnerable, there&#8217;s a good chance someone will exploit it.\u201d<\/p>\n<h2>VMware Pushes Back<\/h2>\n<p>He added that VMware released updates for the most recent vulnerabilities that were disclosed this spring, but that \u201cadversaries are likely taking advantage of organizations that may be slow to patch.\u201d<\/p>\n<p>Coalfire\u2019s Steinkamp also noted that REvil\u2019s ransomware efforts targeting VMs \u201cmay be somewhat blunted because the first command\u00a0the malware runs is disabled by default on ESXi system. Attackers will need to find another way into ESXi systems if this configuration hasn\u2019t been enabled on the systems. Additionally, access to run commands from the malware is dependent upon gaining administrator permissions.\u201d<\/p>\n<p>Enterprises that maintain strong configuration management and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">access control<\/a> will likely do better in these types of ransomware attacks, he said.<\/p>\n<p><strong>Further reading<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">How Zero Trust Security Can Protect Against Ransomware<\/a><\/p>\n<p>Dirk Schrader, global vice president for security research at Netwrix\u2019s New Net Technologies business, told <em>eSecurity Planet<\/em> that for companies running ESXi environments, they should make sure to check their exposure, validate all accounts that have access to the environment and closely monitor for any changes that are happening.<\/p>\n<p>Shawn Smith, director of infrastructure at cybersecurity vendor nVisium, agreed, noting that companies also will want to keep good backups and have well-tested business continuity and disaster recovery plans in place in case such an attack happens and to keep up with the always-evolving cyberattack methods.<\/p>\n<p>\u201cThis attack on the virtual machine infrastructure is a good reminder that new avenues of attack are being created every day, and if an attack doesn&#8217;t exist today, it&#8217;s still a real possibility tomorrow,\u201d Smith told <em>eSecurity Planet<\/em>.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ed89937e7-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ed89937e7\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ed89937e7\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ed89937e7\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ed89937e7\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ed89937e7\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ed89937e7\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Virtual machines are becoming an increasingly popular avenue cybercriminals are taking to distribute their ransomware payloads onto compromised corporate networks. Bad actors have been exploiting VMs in recent years as a way of running under the radar, making it more difficult to detect their malware while it encrypts the data they intend to hold for [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18763,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-18762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Groups are Targeting VMs<\/title>\n<meta name=\"description\" content=\"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Groups are Targeting VMs\" \/>\n<meta property=\"og:description\" content=\"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T17:11:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-07T23:48:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Ransomware Groups are Targeting VMs\",\"datePublished\":\"2021-06-30T17:11:47+00:00\",\"dateModified\":\"2021-09-07T23:48:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\"},\"wordCount\":1134,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\",\"name\":\"Ransomware Groups are Targeting VMs\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg\",\"datePublished\":\"2021-06-30T17:11:47+00:00\",\"dateModified\":\"2021-09-07T23:48:15+00:00\",\"description\":\"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg\",\"width\":1088,\"height\":725,\"caption\":\"VM security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Groups are Targeting VMs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Groups are Targeting VMs","description":"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Groups are Targeting VMs","og_description":"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/","og_site_name":"eSecurity Planet","article_published_time":"2021-06-30T17:11:47+00:00","article_modified_time":"2021-09-07T23:48:15+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Ransomware Groups are Targeting VMs","datePublished":"2021-06-30T17:11:47+00:00","dateModified":"2021-09-07T23:48:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/"},"wordCount":1134,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg","keywords":["ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/","url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/","name":"Ransomware Groups are Targeting VMs","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg","datePublished":"2021-06-30T17:11:47+00:00","dateModified":"2021-09-07T23:48:15+00:00","description":"Ransomware groups are getting more aggressive and concealing their attacks better. Virtual machines have become a favorite attack vector.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Virtualization-04-1088x725-1.jpg","width":1088,"height":725,"caption":"VM security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware Groups are Targeting VMs"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18762"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18762"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18763"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18762"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18762"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18762"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}