Threat Alert: Ransomware Targeting VMware ESXi Servers

Advanced Computer Technologies' Threat Alert: Ransomware Targeting VMware ESXi Servers



VMware ESXi Servers are the target of a recent ransomware campaign. This global threat, dubbed “ESXiArgs,” appear to be targeting unpatched and unprotected instances of VMware ESXi.

Who is Affected / Which CVEs are Involved?

The primary impact is to organizations that are running unpatched versions of ESXi, where attackers also have direct access to ESXi management interfaces.

It is very likely that attackers are using any vulnerability accessible to them, but the media has speculated about the involvement of these specific CVEs:

  • CVE-2022-31699
  • CVE-2021-21995
  • CVE-2021-21974
  • CVE-2020-3992
  • CVE-2019-5544
What do I Need to Do

Organizations that are running versions of software older than current releases are at risk and should be updated to the latest versions immediately. Customer security personnel should make assessments of more nuanced situations; for assistance with security assessments please engage VMware Professional Services.

Additional Questions

For more information on this threat or to learn about how the Advanced Security Team works with clients to mitigate threats like this, don’t hesitate to reach out or schedule a call.


Contact Advanced Computer Technologies

Recent Posts

Enhancing Digital Security through Device Updates and Profile Management

In this webinar, we will delve deep into the fascinating world of social engineering, where human psychology and manipulation intersect with the cybersecurity landscape.

Join us to uncover the secrets of social engineering, learn how to recognize and defend against these cunning tactics, and gain a profound understanding of the pivotal role that the human element plays in securing our digital world.

Read More »

Securing Your Mobile Device

In an era dominated by technology, mobile devices have become an integral part of our daily lives. Smartphones and tablets are no longer just communication tools but have evolved into indispensable companions that help us navigate, connect, and manage our increasingly digital existence. As these devices continually enhance our productivity and convenience, they also become attractive targets for those who seek to exploit vulnerabilities.

Read More »