Description

APT INC, formerly known as SEXi ransomware, has recently gained attention for its targeted attacks on VMware ESXi servers and Windows systems using Babuk and LockBit 3 encryptors. Starting in February 2024, the group made headlines with a significant breach at IxMetro Powerhost, a Chilean hosting provider where VMware ESXi servers were compromised. Initially identified by the distinctive ".SEXi" extension and "SEXi.txt" ransom notes, the operation has since evolved under various aliases like SOCOTRA, FORMOSA, and LIMPOPO, while maintaining its focus on VMware ESXi environments. APT INC, as it now brands itself since June, continues to employ Babuk and LockBit 3 encryptors. Victims of APT INC have reported similar experiences, where the ransomware encrypts critical files related to virtual machines and demands varying sums, often ranging from tens of thousands to millions in cryptocurrency. The ransom notes direct victims to communicate via the Session encrypted messaging application, using a consistent contact address noted since the SEXi campaigns. Unfortunately, decryption remains challenging as both Babuk and LockBit 3 encryptors are known for their robust security and lack of vulnerabilities. This has propelled their adoption among cybercriminals targeting VMware ESXi infrastructure, widely used across enterprises. The attacks underscore ongoing challenges in securing virtualized environments against sophisticated ransomware threats, highlighting the need for robust cybersecurity measures and incident response strategies to mitigate such risks effectively.