SANS Institute’s Post

View organization page for SANS Institute, graphic

321,776 followers

How are ransomware actors targeting your virtual infrastructure? Why target general machines when an ESXi cluster taken down can lead to hundreds or thousands of ransomware devices? In this episode of Wait Just an Infosec, FOR528 course author Ryan Chapman, Nicklas Keijser and Anders Olsson discuss these questions and more. Don't miss it. #Ransomware #LiveStream #WaitJustanInfosec

Understanding Ransomware Threats to ESXi: Essential Insights

Understanding Ransomware Threats to ESXi: Essential Insights

www.linkedin.com

Marco Napolitan

SOC Analyst | Cybersecurity Threat Hunter | Lantech Longwave - Zucchetti

1w

I just have a question. You mentioned a way to connect ESXi to Active Directory in case the credentials to access it are not reachable. Would it make sense to also monitor this type of activity, or would the reaction times not be sufficient to respond to this type of threat?

Ivan Arteaga

Strategic Technology Leader | CTO | Cybersecurity | Cloud | Digital Transformation

1w

here in Latam we had a big incident with a MSP called IFX Networks, it got almost 100% of their cloud customers down for almost a week, all because of a "zero-day" vulnerability in the VMware hypervisor that let the attackers encrypt all the hypervisors

Naing Naing Win Tun

Accredited Tier Specialist (ATS - 1071) Uptime Institute, CCNA (R & S, SECURITY), MCSA, MCTS, MCP

1w

here from Myanmar

Stephen A. Hart

🇯🇲🇺🇸 | Driven millions in revenue through innovative brand and content marketing strategies | Content Marketing Leader | Personal Brand Strategist | Alum of LinkedIn Creator Accelerator | #BestDadEver

1w

Learn more about the Aviata Cloud Solo Flight Challenge: https://www.sans.org/blog/aviata-solo-flight-challenge-cloud-security-workshops/

Like
Reply
Ryan Chapman

Threat Hunter | Host & Network Forensics | Malware Analysis | SANS Author (FOR528) & Instructor | CactusCon Crew | PluralSight Author

1w

ESXi hardening guides: https://for528.com/esxi4

Stephen A. Hart

🇯🇲🇺🇸 | Driven millions in revenue through innovative brand and content marketing strategies | Content Marketing Leader | Personal Brand Strategist | Alum of LinkedIn Creator Accelerator | #BestDadEver

1w

Learn more about ESXi-Targeting Ransomware: http://for528.com/esxi

Stephen A. Hart

🇯🇲🇺🇸 | Driven millions in revenue through innovative brand and content marketing strategies | Content Marketing Leader | Personal Brand Strategist | Alum of LinkedIn Creator Accelerator | #BestDadEver

1w
Like
Reply
Ryan Chapman

Threat Hunter | Host & Network Forensics | Malware Analysis | SANS Author (FOR528) & Instructor | CactusCon Crew | PluralSight Author

1w
Dennis Yarizadeh, MS

Consulting Incident Responder at Check Point Technologies

1w

Would love to hear some post mortem analysis workflows for RCA regarding successfully ransomware against esxi

See more comments

To view or add a comment, sign in

Explore topics