The leak of the source code of the Babuk ransomware allowed 9 ransomware gangs to create their own ransomware targeting VMware ESXi systems.
SentinelLabs researchers have identified 10 ransomware families using VMware ESXi lockers based on the source code of the Babuk ransomware that was leaked in 2021.
The experts pointed out that these ransomware families were detected through H2 2022 and H1 2023, a circumstance that suggests that an increasing number of threat actors is using the source code of the Babuk ransomware.
The experts explained that the availability of the leaked source code allow threat actors to create a ransomware to target Linux systems, even if they lack of expertise.
SentinelLabs researchers compiled an unstripped Babuk binary to establish a baseline of the Babuk ransomware (‘Baseline Babuk’) and compared the detected variants to it.
The researchers discovered the following variants that are based on the Babuk ESXi source code:
- Babuk 2023 that emerged in March 2023 on Bleeping Computer’s forum as highlighted by @malwrhunterteam.
- Play (.FinDom) with artifacts associated with Play Ransomware.
- Mario (.emario) operated by Ransom House.
- Conti POC (.conti)
- REvil aka Revix (.rhkrc)
- Cylance ransomware (unrelated to the security company of the same name)
- Dataf Locker
- Rorschach aka BabLock
- RTM Locker (per Uptycs)
However the expers found “little similarity” between ESXiArgs and Babuk which caused wrong attribution.
“Babuk is occasionally blamed in error, too. Reports on the February ESXiArgs campaign–which briefly devastated some unpatched cloud services–claim the eponymous locker is derived from Babuk. However, our analysis found little similarity between ESXiArgs and Babuk. The only noteworthy similarity is the use of the same open-source Sosemanuk encryption implementation. The main function is entirely different, as shown below.” reads the report published by Sentinelone.
The analysis published by SentinelOne revealed that Conti and REvil ESXi lockers overlap with the Babuk ransomware code.
However, while REvil was likely a tentative, the experts speculate that the Babuk, Conti, and REvil gangs potentially outsourced an ESXi locker project to the same developer.
The two ransomware operations may have experienced small leaks or they have collaborated by sharing the code.
“Based on the popularity of Babuk’s ESXi locker code, actors may also turn to the group’s Go-based NAS locker. Golang remains a niche choice for many actors, but it continues to increase in popularity.” concludes the report.
We are in the final!
Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini
Please nominate Security Affairs as your favorite blog.
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
(SecurityAffairs – hacking, Babuk)