New Linux Ransomware Targets VMware ESXi: Admin Privileges Required, Files Locked
Researchers discovered a new Linux variant of TargetCompany ransomware that targets VMware ESXi environments. This sneaky malware ensures it has administrative privileges before encrypting files with VM-related extensions, leaving them with a “.locked” suffix. Oh, and it cleans up after itself too—talk about a tidy cyber-criminal!

Hot Take:
Move over, Hollywood hackers—there’s a new villain in town, and it’s targeting your virtual machines with all the subtlety of a bull in a VMware shop!
Key Points:
- New Linux variant of TargetCompany ransomware targets VMware ESXi environments.
- Secures administrative privileges before executing malicious activities.
- Uses ‘uname’ command to detect VMware ESXi environment and creates “TargetInfo.txt” file.
- Encrypts VM-related files and appends the “.locked” extension.
- Deletes payload post-encryption to erase traces of the attack.
Already a member? Log in here