Skip to content

Active Development of Ransomware-service 'shinysp1d3r' Targeting VMware ESXi Servers for Encryption

Cybercriminal Shinysp1d3r reportedly launches attack on VMware ESXi, utilizing stolen SSO/SSH keys to encrypt VMDKs using AES-256 encryption and disabling snapshots.

Active development of new 'shinysp1d3r' ransomware, designed to encrypt VMware ESXi systems,...
Active development of new 'shinysp1d3r' ransomware, designed to encrypt VMware ESXi systems, currently underway

Active Development of Ransomware-service 'shinysp1d3r' Targeting VMware ESXi Servers for Encryption

In a concerning development for cloud infrastructure security, a new ransomware-as-a-service (RaaS) platform called Shinysp1d3r has emerged. This cyber threat, developed by the cybercrime group ShinyHunters, is engineered to infect and encrypt VMware ESXi hypervisors and their attached datastores, marking a departure from traditional ransomware tactics.

The Shinysp1d3r RaaS operates through a two-part system. A lightweight loader, written as a position-independent shell script, infects ESXi hosts via SSH or API calls. This loader is deployed using the ESXi host's built-in busybox shell. Once inside, the loader cleans up logs to remove audit traces and disables syslog forwarding to external servers, ensuring its presence remains hidden.

The loader then checks for required privileges and fetches the main ransomware payload from a command and control (C2) server over HTTPS. This payload, an embedded Go-based encryption binary, is used to encrypt each VMDK file attached to the virtual machines.

Shinysp1d3r ensures that no virtual disks can be modified or rolled back by leveraging the hypervisor's local file locking. The daemon employs concurrent worker threads to maximize throughput and avoid triggering hypervisor performance alerts.

Initial access to the system is gained through compromised SSO credentials or SSH keys, followed by a secondary module that spreads laterally across ESXi clusters. Affiliates typically initiate infections by harvesting SSH keys from misconfigured management servers or by abusing stolen SSO tokens obtained through vishing attacks.

Once deployed, the ransomware enumerates all running virtual machines, disables snapshot functionality, and begins simultaneous AES-256 encryption of each VMDK file. The daemon iterates through each datastore path under the root directory and locks files using ESXi's VOMA API.

The project's control panel offers affiliates granular options to tailor the encryption process. Affiliates can monitor real-time progress and negotiate ransom terms using an integrated chat widget. EclecticIQ analysts have observed that Shinysp1d3r is poised to leverage existing ShinyHunters infrastructure and affiliate networks to rapidly expand its victim base once matured.

Shinysp1d3r is still under active development but has already drawn interest from multiple underground forums. This new cloud-focused extortion tool, which first appeared in mid-2025, represents a significant threat to organisations relying on VMware ESXi hypervisors for their cloud infrastructure. It underscores the importance of robust security measures and regular audits to protect against such threats.

Read also:

Latest