Let’s talk Ransomware
I am sure most everyone has heard about the latest ransomware attack called “ESXiArgs”. If you haven’t, two sites I follow have coverage [BleepingComputer and HackerNews].Ransomware uses a software exploit to gain access to a system and block access to that system
until a sum of money is paid. There are instances where this exploit is unknown (also known as a Zero Day exploit). In the case of ESXiArgs, the attackers are targeting an exploit found in OpenSLP. A patch for this issue was released in February 2022 via VMSA 2019-0022. That date is not a typo – the patch has been available for about a year.
Please take a moment and review the VMSA above to ensure you are have applied the patch. If you cannot patch immediately, KB 76372 has steps on disabling the OpenSLP service on your ESXi hosts until you are able to find a patch window.

