Aliases 

  • DarkBit Ransomware 
  • esxi.darkbit (Linux/ESXi payload name observed in incident response) 

 

Get Threat Intel and Security Updates Delivered to Your Inbox.

Profiling 

Threat Actor Type:

  • Ransomware operation assessed to function as a politically motivated disruption tool rather than a purely financially driven Ransomware as a Service (RaaS) group.  

Suspected Attribution:

  • Multiple independent sources link DarkBit activity to the Irannexus threat actor MuddyWater, an APT group historically associated with cyberespionage and sabotage campaigns.  

Expertise: 

  • Purpose built ransomware targeting VMware ESXi environments 
  • Strong operational knowledge of hypervisor administration and VMFS datastores 
  • Focus on rapid service disruption rather than prolonged negotiations 
  • Limited evidence of iterative ransomware development or affiliate ecosystems 

Communications & Infrastructure: 

  • Ransom notes containing political messaging and fixed payment demands 
  • No long running public leak site or sustained victim-shaming infrastructure 
  • Campaigns show minimal engagement with victims post-encryption  
DarkBit: A Threat Profile | Vali Cyber

DarkBit ransom note.

 

Motivation 

Primary Motivation: Operational disruption aligned with geopolitical objectives, rather than consistent revenue generation. 

Secondary Motivations: 

  • Psychological and reputational impact 
  • Signaling capability following regional political or military events 
  • Use of ransomware tooling as a cover for state aligned sabotage activity  

 

Timeline 

2023 – Initial Activity Observed 

  • DarkBit campaigns detected following regional geopolitical events. 
  • Attacks encrypting multiple VMware ESXi servers within a single organization were investigated by incident response teams.  

2025 – Technical Disclosure & Cryptographic Break 

  • Security researchers disclosed critical flaws in DarkBit’s encryption implementation. 
  • Victims were able to recover data without paying ransom due to predictable key generation and partial encryption of VMDK files. 

Current Status (as of March 2026) 

  • No evidence of an active mass scale campaign or modernized variants. 
  • DarkBit remains relevant as a case study in hypervisor targeted, politically motivated ransomware, rather than a high-volume criminal operation.  

 

Tactics & Techniques 

Initial Access 

Public reporting does not conclusively document a single initial access vector. Sources indicate compromise occurred prior to ESXi level execution. No zero-day exploitation has been publicly attributed.  

Execution 

  • T1059.012 – Command and Scripting Interpreter: Hypervisor CLI: Abuses native ESXi utilities (e.g., esxcli) to stop virtual machines and prepare hosts for encryption. 

Discovery 

  • T1083 – File and Directory Discovery: Enumerates VMFS datastores to locate virtual machine files. 
  • T1613 – Virtual Machine Discovery: Identifies running VMs prior to encryption. 

Impact 

  • T1486 – Data Encrypted for Impact: Encrypts VMDK, VMX, and NVRAM files on ESXi hosts. 
  • T1529 – System Shutdown / Reboot: Stops virtual machines before encryption to ensure maximum disruption. 
  • T1490 – Inhibit System Recovery (partial): Hypervisor‑level encryption prevents VM recovery without backups. 

 

Victimology 

Victim Disclosure: No public leak site and has not reliably named victims in public channels.  

Observed Victim Characteristics: 

  • Organizations with centralized VMware ESXi infrastructure 
  • Multidepartment enterprises 
  • Educational institutions 

Geographic Focus: Israel (primary and repeatedly documented), surrounding regions

These patterns are consistent with politically motivated targeting rather than opportunistic ransomware victim selection.  

Defensive Recommendations

  • Restrict and monitor direct ESXi host access 
  • Audit and alert on ESXi command line usage (esxcli, VM shutdown activity) 
  • Enforce strict credential hygiene for hypervisor administrators 
  • Maintain offline, immutable backups of VM disk files 
  • Treat ransomware activity with political messaging as potential state aligned disruption, not standard extortion 

 

References

Toulas, B. (2025, August 11). MuddyWater’s DarkBit ransomware cracked for free data recoveryBleepingComputer.
https://www.bleepingcomputer.com/news/security/muddywaters-darkbit-ransomware-cracked-for-free-data-recovery/  

Paganini, P. (2025, August 12). Researchers cracked the encryption used by DarkBit ransomwareSecurity Affairs.
https://securityaffairs.com/181064/malware/researchers-cracked-the-encryption-used-by-darkbit-ransomware.html  

Doyle, A. (2026, February 4). MuddyWater’s DarkBit ransomware cracked, allowing free data recoveryDaily Security Review.
https://dailysecurityreview.com/security-spotlight/muddywaters-darkbit-ransomware-cracked-allowing-free-data-recovery/  

Cyber Security News. (2025, August 12). DarkBit hackers attacking VMware ESXi servers to deploy ransomware and encrypt VMDK files.
https://cybersecuritynews.com/darkbit-hackers-attacking-vmware-esxi-servers/  

GBHackers. (2025, August 12). DarkBit hackers target VMware ESXi servers to deploy ransomware.
https://gbhackers.com/darkbit-hackers-target-vmware-esxi-servers/  

Thailand Computer Emergency Response Team (ThaiCERT). (2025, August 15). DarkBit ransomware decrypted, allowing victims to recover data without paying ransom.
https://www.thaicert.or.th/en/2025/08/15/darkbit-ransomware-decrypted-allowing-victims-to-recover-data-without-paying-ransom/