RansomHouse gang automates VMware ESXi attacks with new MrAgent tool

RansomHouse gang automates VMware ESXi attacks with new MrAgent tool

February 15, 2024 at 01:57PM

RansomHouse’s new tool ‘MrAgent’ automates deploying its data encrypter across multiple VMware ESXi hypervisors. This ransomware targeting large organizations maximizes impact by compromising critical applications and services. Custom configurations include scheduling an encryption event and altering the hypervisor’s monitor message. The tool’s adaptation for Windows systems demonstrates intent to extend its impact. Trellix emphasizes the severe security implications and the need for comprehensive defense measures.

From the meeting notes, it is clear that the RansomHouse ransomware operation has developed a new tool named ‘MrAgent’ that automates the deployment of its data encrypter across multiple VMware ESXi hypervisors.

The notes highlight that RansomHouse is a ransomware-as-a-service (RaaS) operation using double extortion tactics and targeting large-sized organizations. The tool, MrAgent, has been designed to identify the host system, turn off its firewall, and automate the ransomware deployment process across multiple hypervisors simultaneously, compromising all managed VMs. This allows the attackers to maximize the impact of their campaigns when targeting both Windows and Linux systems. The tool also supports custom configurations for ransomware deployment received directly from the command and control (C2) server.

Additionally, the notes emphasize that the security implications of tools like MrAgent are severe, and therefore, defenders must implement comprehensive and robust security measures, including regular software updates, strong access controls, network monitoring, and logging to defend against such threats.

Full Article