Nitrogen ransomware programmers lock themselves out of a payment — key management bug encrypts victims' data forever

Keyboard random letters
(Image credit: Getty Images)

Anyone who's been on the receiving side of a ransomware attack can tell you they didn't have a good day. But what if that day was terrible for not just the victim, but also the attacker? Thanks to a coding bug, that's precisely the case with a variant of ransomware from the Nitrogen group that encrypts target data and literally tosses away the key, rendering the data completely unrecoverable.

The exact ransomware in question is Nitrogen's VMware ESXi variant, which targets hypervisors (virtual machine host servers) and presumably encrypts the virtual machines residing therein. Hypervisor attacks aren't new, and existing analysis shows that while sysadmins are generally good at deploying endpoint protection on hosted operating systems, they sometimes have lax policies regarding hypervisors.

Article continues below

Google Preferred Source

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Bruno Ferreira
Contributor

Bruno Ferreira is a contributing writer for Tom's Hardware. He has decades of experience with PC hardware and assorted sundries, alongside a career as a developer. He's obsessed with detail and has a tendency to ramble on the topics he loves. When not doing that, he's usually playing games, or at live music shows and festivals.

  • Forge64
    What a SHAME. Poor ransomware programmers! All that "hard work" lost forever!

    Karma. It's rough sometimes.
    Reply
  • cronjob123
    They are so good they encrypted themselves. A menace to society. The ones to be afraid of.
    Reply