Abyss Locker Extortionists Threaten Virtual Infrastructure with Single Click

As enterprises transition from private servers to virtual machines (VMs) in order to enhance resource management, optimize performance, and improve recovery following failures, hackers are increasingly employing encryption techniques specifically targeted at these platforms.

Among the popular VM platforms, VMware ESXi is widely used in corporate environments for the creation and management of virtual infrastructures. It offers various functionalities, including the migration of VMs between physical servers, resource reservation management, network virtualization, and much more. ESXi also integrates seamlessly with other VMware products like VMware vCenter Server, providing centralized control and monitoring of virtual media.

/Reports, release notes, official announcements.