Global Ransomware Attack Targets VMware ESXi Servers

Global Ransomware Attack Targets VMware ESXi Servers


Cybersecurity firms around the world have recently warned of an increase in cyberattacks, particularly those targeting corporate banking clients and computer servers. The Italian National Cybersecurity Agency (ACN) recently reported a global ransomware hacking campaign that targeted VMware ESXi servers, urging organisations to take action to protect their systems.

In addition, Italian cybersecurity firm Cleafy researchers Federico Valentini and Alessandro Strino reported an ongoing financial fraud campaign since at least 2019 that leverages a new web-inject toolkit called drIBAN. The main goal of drIBAN fraud operations is to infect Windows workstations inside corporate environments, altering legitimate banking transfers performed by the victims and transferring money to an illegitimate bank account.


These accounts are either controlled by the threat actors or their affiliates, who are then tasked with laundering the stolen funds. The fraudulent transactions are often realized by means of a technique called Automated Transfer System (ATS) that’s capable of bypassing anti-fraud systems put in place by banks and initiating unauthorized wire transfers from a victim’s own computer.


The operators behind drIBAN have become more adept at avoiding detection and developing effective social engineering strategies, in addition to e

[…]Content was cut in order to protect the source.Please visit the source for the rest of the article.





This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article:




Share this:




Support the originator by clicking the read the rest link below.