New Linux Version of Ransomware Targets VMware ESXi

“Researchers observed a new Linux variant of the TargetCompany ransomware family that targets VMware ESXi environments,” reports BleepingComputer:

In a report Wednesday, cybersecurity company Trend Micro says that the new Linux variant for TargetCompany ransomware makes sure that it has administrative privileges before continuing the malicious routine… Once on the target system, the payload checks if it runs in a VMware ESXi environment by executing the ‘uname’ command and looking for ‘vmkernel.’ Next, a “TargetInfo.txt” file is created and sent to the command and control (C2) server. It contains victim information such as hostname, IP address, OS details, logged-in users and privileges, unique identifiers, and details about the encrypted files and directories. The ransomware will encrypt files that have VM-related extensions (vmdk, vmem, vswp, vmx, vmsn, nvram), appending the “.locked” extension to the resulting files.

Finally, a ransom note named “HOW TO DECRYPT.txt” is dropped, containing instructions for the victim on how to pay the ransom and retrieve a valid decryption key.

“After all tasks have been completed, the shell script deletes the payload using the ‘rm -f x’ command so all traces that can be used in post-incident investigations are wiped from impacted machines.”

Thanks to long-time Slashdot reader joshuark for sharing the article.

Read more of this story at Slashdot.

Boeing Passenger Jet Nearly Crashes Due To Software Glitch

Bruce66423 shares a report from The Independent: A potential disaster was narrowly avoided when a packed passenger plane took off just seconds before it was about to run out of runway because of a software glitch. The Boeing aircraft, operated by TUI, departed from Bristol Airport for Las Palmas, Gran Canaria on 9 March with 163 passengers on board when it struggled to take off. The 737-800 plane cleared runway nine with just 260 metres (853ft) of tarmac to spare at a height of 10ft. It then flew over the nearby A38 road at a height of just 30 metres (100ft) travelling at the speed of around 150kts (about 173mph). The A38 is a major A-class busy road, connecting South West England with the Midlands and the north.

The Air Accidents Investigation Branch (AAIB), part of the Department for Transport, said the incident was the result of insufficient thrust being used during take-off. Pilots manually set the thrust level following a software glitch that Beoing was aware of before take-off. “A Boeing 737-800 completed a takeoff from Runway 09 at Bristol Airport with insufficient thrust to meet regulated performance,” the AAIB report said. “The autothrottle (A/T) disengaged when the takeoff mode was selected, at the start of the takeoff roll, and subsequently the thrust manually set by the crew (84.5% N1 ) was less than the required takeoff thrust (92.8% N1 ). Neither pilot then noticed that the thrust was set incorrectly, and it was not picked up through the standard operating procedures (SOPs).”

Read more of this story at Slashdot.