{"id":267,"date":"2021-07-21T19:53:36","date_gmt":"2021-07-21T14:23:36","guid":{"rendered":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/?p=267"},"modified":"2021-07-21T19:53:39","modified_gmt":"2021-07-21T14:23:39","slug":"linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers","status":"publish","type":"post","link":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/","title":{"rendered":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers"},"content":{"rendered":"<body>\n<p><strong>The ransomware gang behind CD Projekt Red\u2019s attack uses a Linux variant that targets VMware\u2019s ESXi virtual machine platform for maximum damage.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"750\" height=\"500\" src=\"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\" alt=\"\" class=\"wp-image-268\" loading=\"lazy\" srcset=\"https:\/\/www.cyberwebservice.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg 750w, https:\/\/www.cyberwebservice.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines-300x200.jpg 300w, https:\/\/www.cyberwebservice.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines-120x80.jpg 120w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p>With the increase in virtual machines for easier backup and resource management, cyber attackers are developing new tactics to create Linux encrypts targeting these servers. Last week,\u00a0<a href=\"https:\/\/twitter.com\/malwrhunterteam\" rel=\"noreferrer noopener\" target=\"_blank\">MalwareHunterTeam<\/a>\u00a0found several Linux ELF-64 versions of the Hello Kitty ransomware targeting\u00a0VMware\u00a0ESXi servers and virtual machines (VMs) running on them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Force to shutdown virtual machines<\/h2>\n\n\n\n<p>VMware ESXi is one of the most popular enterprise virtual machine platforms; there has been an increasing number of ransomware releasing Linux encryptors targeting this platform. VMware ESXi, formerly known as ESX, has its own custom kernel. However, it is capable of running ELF-64 Linux executables.<\/p>\n\n\n\n<p>Although it has been known that HelloKitty uses a Linux encryptor, this is the first sample that MalwareHunterTeam\u2019s researchers have publicly discovered. They shared examples of the ransomware with BleepingComputer. With the ransomware, the attackers attempt to shut down running virtual machines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypting virtual machines with a single command<\/h2>\n\n\n\n<p>When shutting down the virtual machines, the ransomware will first try a graceful shutdown using the \u2018soft\u2019 command. If the virtual machine is still running on, it will try an immediate shutdown of virtual machines using the \u2018hard\u2019 command. Finally, if virtual machines are still running, the malware will use the \u2018force\u2019 command to shut down any running VMs forcefully.<\/p>\n\n\n\n<p>With the shutting down of the virtual machine, the ransomware will begin encrypting. vmdk (virtual hard disk), .vmsd (metadata and snapshot information), and .vmsn (contains the active state of the VM) files. This method allows a ransomware gang to encrypt many virtual machines with a single command.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is HelloKitty ransomware?<\/h2>\n\n\n\n<p>HelloKitty is a ransomware group that has been active since November 2020. They stole the source code from the video game company \u201cCD Project RED\u201d for their games and uploaded them to their leak site.<\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>The ransomware gang behind CD Projekt Red\u2019s attack uses a Linux variant that targets VMware\u2019s ESXi virtual machine platform for maximum damage. With the increase in virtual machines for easier backup and resource management, cyber attackers are developing new tactics to create Linux encrypts<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[41],"tags":[],"class_list":["post-267","post","type-post","status-publish","format-standard","hentry","category-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Linux variant of HelloKitty ransomware attacks VMware ESXi servers<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux variant of HelloKitty ransomware attacks VMware ESXi servers\" \/>\n<meta property=\"og:description\" content=\"The ransomware gang behind CD Projekt Red\u2019s attack uses a Linux variant that targets VMware\u2019s ESXi virtual machine platform for maximum damage. With the increase in virtual machines for easier backup and resource management, cyber attackers are developing new tactics to create Linux encrypts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Web Service SEO, Internet, Hosting, Web designing Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cyberwebservice\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-21T14:23:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T14:23:39+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\" \/>\n<meta name=\"author\" content=\"Cyber Web Service\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cyberwebservice\" \/>\n<meta name=\"twitter:site\" content=\"@cyberwebservice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Web Service\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/\"},\"author\":{\"name\":\"Cyber Web Service\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#\\\/schema\\\/person\\\/66b6f961b2f9b5a10e7c792dcda74afa\"},\"headline\":\"Linux variant of HelloKitty ransomware attacks VMware ESXi servers\",\"datePublished\":\"2021-07-21T14:23:36+00:00\",\"dateModified\":\"2021-07-21T14:23:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/\"},\"wordCount\":328,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/cybercom.wwwsg1-sr9.supercp.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\",\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/\",\"url\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/\",\"name\":\"Linux variant of HelloKitty ransomware attacks VMware ESXi servers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/cybercom.wwwsg1-sr9.supercp.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\",\"datePublished\":\"2021-07-21T14:23:36+00:00\",\"dateModified\":\"2021-07-21T14:23:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#primaryimage\",\"url\":\"http:\\\/\\\/cybercom.wwwsg1-sr9.supercp.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\",\"contentUrl\":\"http:\\\/\\\/cybercom.wwwsg1-sr9.supercp.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/index.php\\\/2021\\\/07\\\/21\\\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux variant of HelloKitty ransomware attacks VMware ESXi servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/\",\"name\":\"Cyber Web Service SEO, Internet, Hosting, Web designing Blog\",\"description\":\"CWS Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#organization\",\"name\":\"Cyber Web Service\",\"url\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/header.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/header.jpg\",\"width\":249,\"height\":75,\"caption\":\"Cyber Web Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cyberwebservice\",\"https:\\\/\\\/x.com\\\/cyberwebservice\",\"https:\\\/\\\/www.instagram.com\\\/cyberwebservice\",\"https:\\\/\\\/www.pinterest.com\\\/cyberwebservice\",\"https:\\\/\\\/www.youtube.com\\\/cyberwebservice\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberwebservice.com\\\/blog\\\/#\\\/schema\\\/person\\\/66b6f961b2f9b5a10e7c792dcda74afa\",\"name\":\"Cyber Web Service\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g\",\"caption\":\"Cyber Web Service\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/","og_locale":"en_US","og_type":"article","og_title":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers","og_description":"The ransomware gang behind CD Projekt Red\u2019s attack uses a Linux variant that targets VMware\u2019s ESXi virtual machine platform for maximum damage. With the increase in virtual machines for easier backup and resource management, cyber attackers are developing new tactics to create Linux encrypts","og_url":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/","og_site_name":"Cyber Web Service SEO, Internet, Hosting, Web designing Blog","article_publisher":"https:\/\/www.facebook.com\/cyberwebservice","article_published_time":"2021-07-21T14:23:36+00:00","article_modified_time":"2021-07-21T14:23:39+00:00","og_image":[{"url":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg","type":"","width":"","height":""}],"author":"Cyber Web Service","twitter_card":"summary_large_image","twitter_creator":"@cyberwebservice","twitter_site":"@cyberwebservice","twitter_misc":{"Written by":"Cyber Web Service","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#article","isPartOf":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/"},"author":{"name":"Cyber Web Service","@id":"https:\/\/www.cyberwebservice.com\/blog\/#\/schema\/person\/66b6f961b2f9b5a10e7c792dcda74afa"},"headline":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers","datePublished":"2021-07-21T14:23:36+00:00","dateModified":"2021-07-21T14:23:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/"},"wordCount":328,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#primaryimage"},"thumbnailUrl":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg","articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/","url":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/","name":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers","isPartOf":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#primaryimage"},"thumbnailUrl":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg","datePublished":"2021-07-21T14:23:36+00:00","dateModified":"2021-07-21T14:23:39+00:00","breadcrumb":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#primaryimage","url":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg","contentUrl":"http:\/\/cybercom.wwwsg1-sr9.supercp.com\/blog\/wp-content\/uploads\/2021\/07\/Linux-variant-of-HelloKitty-ransomware-attacks-VMware-ESXi-servers-and-virtual-machines.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/2021\/07\/21\/linux-variant-of-hellokitty-ransomware-attacks-vmware-esxi-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberwebservice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux variant of HelloKitty ransomware attacks VMware ESXi servers"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberwebservice.com\/blog\/#website","url":"https:\/\/www.cyberwebservice.com\/blog\/","name":"Cyber Web Service SEO, Internet, Hosting, Web designing Blog","description":"CWS Blog","publisher":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberwebservice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyberwebservice.com\/blog\/#organization","name":"Cyber Web Service","url":"https:\/\/www.cyberwebservice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberwebservice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberwebservice.com\/blog\/wp-content\/uploads\/2019\/06\/header.jpg","contentUrl":"https:\/\/www.cyberwebservice.com\/blog\/wp-content\/uploads\/2019\/06\/header.jpg","width":249,"height":75,"caption":"Cyber Web Service"},"image":{"@id":"https:\/\/www.cyberwebservice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cyberwebservice","https:\/\/x.com\/cyberwebservice","https:\/\/www.instagram.com\/cyberwebservice","https:\/\/www.pinterest.com\/cyberwebservice","https:\/\/www.youtube.com\/cyberwebservice"]},{"@type":"Person","@id":"https:\/\/www.cyberwebservice.com\/blog\/#\/schema\/person\/66b6f961b2f9b5a10e7c792dcda74afa","name":"Cyber Web Service","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cae5228e9c2130cea080e21c586354c98e61043f45f280b9a15d84a00cb5d335?s=96&d=mm&r=g","caption":"Cyber Web Service"}}]}},"_links":{"self":[{"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=267"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/267\/revisions"}],"predecessor-version":[{"id":269,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/267\/revisions\/269"}],"wp:attachment":[{"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberwebservice.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}