{"id":4247,"date":"2021-07-05T09:19:20","date_gmt":"2021-07-05T07:19:20","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4247"},"modified":"2024-05-15T16:11:07","modified_gmt":"2024-05-15T14:11:07","slug":"revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/","title":{"rendered":"REvil got a new target &#8211; ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers"},"content":{"rendered":"\n<p>Welcome to the <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Security Center<\/a>. Do you remember <a href=\"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dell&#8217;s and WD My Book NAS\u2019 stories from last week<\/a>? Can today&#8217;s topics beat them? Let\u2019s find out. There is a new and disturbing trend in the cybercriminal world. More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is able to encrypt virtual resources. A new PoC exploit also made its (accidentally) debut on the internet. PrintNightmare, the new critical Windows RCE, runs at the highest privilege level. This means that it is capable to dynamically load third-party binaries. As you can see, the problem is quite serious. There has also been a discussion about the critical vulnerabilities in NETGEAR routers which could be reliably abused as a jumping-off point to compromise a network&#8217;s security and gain unfettered access. We also have some bad news for LinkedIn users &#8211; a new database with 700 million records has just hit the black market. Details can be found below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"revil-ransomwares-new-linux-encryptor-targets-esxi-virtual-machines\"><strong>REvil ransomware&#8217;s new Linux encryptor targets ESXi virtual machines<\/strong><\/h2>\n\n\n<p>REvil ransomware group is using a Linux encryptor that targets and encrypts VMware ESXi virtual machines. But there are not the only ones. Operators such as Babuk, RansomExx\/Defray, Mespinoza, GoGoogle, DarkSide, and Hellokitty have also created Linux encryptors to target ESXi virtual machines.<\/p>\n\n\n\n<p>With so many enterprise companies moving to virtual machines for easier backups, device management, and efficient use of resources, it\u2019s no wonder that so many ransomware gangs increasingly create their own tools to mass encrypt storage used by VMs.&nbsp;<\/p>\n\n\n\n<p>The newest REvil ransomware Linux variant is an ELF64 executable and includes the same configuration options utilized by the more common Windows executable. This is the first known time the Linux variant has been publicly available since it was released.<\/p>\n\n\n\n<p>When executed on a server, a threat actor can specify the path to encrypt and enable a silent mode. Later, when executed on ESXi servers, it will run the esxcli command line tool to list all running ESXi virtual machines and terminate them. A specially crafted command is used to close the virtual machine disk (VMDK) files stored in the \/vmfs\/ folder so that the REvil ransomware malware can encrypt the files without them being locked by ESXi.<\/p>\n\n\n\n<p><strong>More problems on the horizon\u2026<\/strong><\/p>\n\n\n\n<p>If a virtual machine is not correctly closed before encrypting its file, it could lead to data corruption. Then even a decryptor provided by the ransomware group is not going to work properly. But that&#8217;s the victim problem and the admin who will have to face it\u2026 eventually.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomwares-new-linux-encryptor-targets-esxi-virtual-machines\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"printnightmare-a-new-critical-windows-rce-which-got-accidental-poc-exploit-leak\"><strong>PrintNightmare, a new critical Windows RCE which got accidental PoC exploit leak<\/strong><\/h2>\n\n\n<p>A proof-of-concept (PoC) exploit related to a remote code execution vulnerability affecting Windows Print Spooler and patched by Microsoft earlier this month was briefly published online before being taken down.<\/p>\n\n\n\n<p>The Print Spooler vulnerability identified as CVE-2021-1675, could grant remote attackers full control of vulnerable systems. The program manages the printing process in Windows, including loading the appropriate printer drivers and scheduling the print job for printing. That is why the flaw is so concerning &#8211; the Print Spooler commands run at the highest privilege level and can dynamically load third-party binaries.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"a-codename-printnightmare\"><strong>A codename &#8222;PrintNightmare&#8221;<\/strong><\/h5>\n\n\n<p>The Windows maker addressed the vulnerability as part of its Patch Tuesday update on June 8, 2021. But almost two weeks later, Microsoft revised the flaw&#8217;s impact from an elevation of privilege to remote code execution (RCE) as well as upgraded the severity level from Important to Critical. During this time, a Hong Kong-based cybersecurity company Sangfor published deep-dive of the vulnerability, along with a fully working PoC code to GitHub, where it remained publicly accessible before it was taken offline a few hours later.<\/p>\n\n\n\n<p>The successful exploitation of CVE-2021-1675 could open the door to complete system takeover by remote adversaries. But it\u2019s possible that the fix released by Microsoft in June does not completely remediate the root cause of the bug, raising the possibility that it&#8217;s a zero-day flaw in need of a patch. Based on this last information we also recommend administrators disable the Windows Print spooler service in Domain Controllers and systems that do not print.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/06\/researchers-leak-poc-exploit-for.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-discloses-critical-bugs-allowing-netgear-routers-takeovernbsp\"><strong>Microsoft discloses critical bugs allowing NETGEAR routers takeover <\/strong><\/h2>\n\n\n<p>Microsoft discovered critical security vulnerabilities affecting NETGEAR routers, which could be reliably abused as a jumping-off point to compromise a network&#8217;s security and gain unfettered access.<\/p>\n\n\n\n<p>The security flaws impact DGN2200v1 series routers running firmware versions before v1.0.0.60 and compatible with all major DSL Internet service providers.<\/p>\n\n\n\n<p>They allow unauthenticated attackers to access unpatched routers&#8217; management pages via authentication bypass, gain access to secrets stored on the device and derive saved router credentials using a cryptographic side-channel attack.<\/p>\n\n\n\n<p>Furthermore, by abusing the aforementioned authentication bypass to fetch the configuration file, the researchers found that the credentials were encrypted using a constant key, which can be subsequently used to retrieve the plaintext password and the user name.<\/p>\n\n\n\n<p>The security issues were discovered by Microsoft&#8217;s researchers while reviewing Microsoft Defender for Endpoint&#8217;s new device discovery fingerprinting capabilities after noticing that a DGN2200v1 router&#8217;s management port was being accessed by another device on the network.<\/p>\n\n\n\n<p>NETGEAR has fixed the vulnerabilities, with CVSS base scores ranging from high to critical severity, and has published a security advisory with additional details in December.<\/p>\n\n\n\n<p>To download and install the patched firmware for your NETGEAR router, you have to&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Visit <a href=\"https:\/\/www.netgear.com\/support\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NETGEAR support<\/a> webpage<\/li><li>Start typing your model number in the search box, then select your model as it appears or select a product category to browse for your product model.<\/li><li>Click <strong>Downloads<\/strong><\/li><li>From <strong>Current Versions<\/strong> select the download with a title beginning with <strong>Firmware Version<\/strong>.<\/li><li>Confirm <strong>Download<\/strong><\/li><li>Follow the further instructions and install the new firmware.&nbsp;<\/li><\/ol>\n\n\n\n<p>Sources <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-finds-netgear-router-bugs-enabling-corporate-breaches\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> | <a href=\"https:\/\/thehackernews.com\/2021\/06\/microsoft-discloses-critical-bugs.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"data-for-700m-linkedin-users-posted-for-sale-on-hacker-forum\"><strong>Data for 700M LinkedIn users posted for sale on hacker forum<\/strong><\/h2>\n\n\n<p>Ups, it happened again. First, in April 500 million Linkedin enthusiasts were affected in a data-scraping incident. Now, a new posting with 700 million Linkedin records has appeared on a popular hacker forum.&nbsp;<\/p>\n\n\n\n<p>Analysts from Privacy Sharks stumbled across the data put up for sale on RaidForums by a hacker calling himself \u201cGOD User TomLiner.\u201d The advertisement, posted June 22, claims that 700 million records are included in the cache, and included a sample of 1 million records as \u201cproof.\u201d<\/p>\n\n\n\n<p>The records include full names, gender, email addresses, phone numbers, and industry information. It\u2019s unclear what the origin of the data is \u2013 but the scraping of public profiles is a likely source. That was the engine behind the collection of 500 million LinkedIn records that went up for sale in April.<\/p>\n\n\n\n<p>There are 200 million more records available in the collection this time around, so it\u2019s probable that new data has been scrapped and that it\u2019s more than a rehash of the previous group of records, researchers added.<\/p>\n\n\n\n<p>According to LinkedIn, no breach of its networks has occurred this time, either. However, they are still investigating this issue.&nbsp;<\/p>\n\n\n\n<p>The good news is that credit card data, private message contents, and other sensitive information is not a part of the incident. However, with details such as email addresses and phone numbers made available, LinkedIn users could become the target of spam campaigns, or worse still, victims of identity theft. There are also potential brute-force attacks to be concerned about. And finally, the data could be a social-engineering goldmine.<\/p>\n\n\n\n<p>Linkedin users should be cautious and suspicious of any questionable messages or actions. Also, they should update Linkedin passwords and enable two-factor authentication.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/data-700m-linkedin-users-cyber-underground\/167362\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Mercedes Benz Data Leak Includes Card and Social Security Details (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mercedes-benz-leak-card-social\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a>)<br>2. The builder for Babuk Locker ransomware was leaked online (<a href=\"https:\/\/securityaffairs.co\/wordpress\/119467\/cyber-crime\/babuk-locker-ransomware-builder.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>3. Microsoft successfully hit by dependency hijacking again (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-successfully-hit-by-dependency-hijacking-again\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)&nbsp;<br>4. NVIDIA Patches high-severity GeForce spoof-attack bug (<a href=\"https:\/\/threatpost.com\/nvidia-high-severity-geforce-spoof-bug\/167345\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<br>5. Details of RCE bug in Adobe Experience Manager revealed (<a href=\"https:\/\/threatpost.com\/rce-bug-in-adobe-revealed\/167382\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<br>6. SolarWinds hackers remained hidden in Denmark\u2019s central bank for months (<a href=\"https:\/\/securityaffairs.co\/wordpress\/119527\/cyber-warfare-2\/denmarks-central-bank-solarwinds-hackers.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>7. Salvation Army hit by ransomware attack(<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/salvation-army-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity<\/a>)<br>8. Trickbot cybercrime group linked to new Diavol ransomware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trickbot-cybercrime-group-linked-to-new-diavol-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<br>9. GitHub unveils AI tool to speed development, but beware insecure code (<a href=\"https:\/\/beta.darkreading.com\/application-security\/github-unveils-ai-tool-to-speed-development-but-beware-insecure-code\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a>)<br>10. Lorenz ransomware victims can now recover files with this free decryption tool (<a href=\"https:\/\/www.zdnet.com\/article\/lorenz-ransomware-attack-victims-can-now-retrieve-their-files-for-free-with-this-decryption-tool\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Xopero Security Center. Do you remember Dell&#8217;s and WD My Book NAS\u2019 stories from last week? Can today&#8217;s topics beat them? Let\u2019s find out. There is a new and disturbing trend in the cybercriminal world. More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is able to encrypt virtual resources. A new PoC exploit also made its (accidentally) debut on the internet. PrintNightmare, the new critical Windows RCE, runs at the highest privilege level. This means that it is capable to dynamically load third-party binaries. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>REvil got a new target - ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers - Xopero Blog<\/title>\n<meta name=\"description\" content=\"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REvil got a new target - ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-05T07:19:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T14:11:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"REvil got a new target &#8211; ESXi VMs \\\/ PrintNightmare \\\/ Critical bug in NETGEAR routers\",\"datePublished\":\"2021-07-05T07:19:20+00:00\",\"dateModified\":\"2024-05-15T14:11:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/\"},\"wordCount\":1391,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/\",\"name\":\"REvil got a new target - ESXi VMs \\\/ PrintNightmare \\\/ Critical bug in NETGEAR routers - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-07-05T07:19:20+00:00\",\"dateModified\":\"2024-05-15T14:11:07+00:00\",\"description\":\"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"REvil got a new target &#8211; ESXi VMs \\\/ PrintNightmare \\\/ Critical bug in NETGEAR routers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"REvil got a new target - ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers - Xopero Blog","description":"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/","og_locale":"pl_PL","og_type":"article","og_title":"REvil got a new target - ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers - Xopero Blog","og_description":"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...","og_url":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-07-05T07:19:20+00:00","article_modified_time":"2024-05-15T14:11:07+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"REvil got a new target &#8211; ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers","datePublished":"2021-07-05T07:19:20+00:00","dateModified":"2024-05-15T14:11:07+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/"},"wordCount":1391,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/","url":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/","name":"REvil got a new target - ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-07-05T07:19:20+00:00","dateModified":"2024-05-15T14:11:07+00:00","description":"More and more hacker groups are migrating towards ESXi virtual machines. Now also REvil operators have prepared a Linux encryptor that is...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/revil-got-a-new-target-esxi-vms-printnightmare-critical-bug-in-netgear-routers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"REvil got a new target &#8211; ESXi VMs \/ PrintNightmare \/ Critical bug in NETGEAR routers"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4247"}],"version-history":[{"count":6,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4247\/revisions"}],"predecessor-version":[{"id":5864,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4247\/revisions\/5864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}