Ransomware Cheers

The Cheers ransomware, even with only a short time of activity, has amassed several victims around the world, drawing attention.

Cheers has focused its efforts on unprotected virtual systems, such as VMware ESXi environments. This is not the first time that VMware servers have been prime targets for ransomware attacks.

Groups such as LockBit or HiveLeaks have acted in this way before and generated many serious after-effects in companies around the world.

A senior software developer at cybersecurity company nVisium claimed that an ESXi server “is much more than just a server.”

He also explained that: ”Its ability to host multiple virtual machines increases its importance within an organization’s IT system and therefore greatly increases the likelihood that an organization will pay the ransom to restore its servers.”

Once the VMware ESXi server has been hacked, the attackers launch the Cheers ransomware into the environment. The malware takes care of monitoring and quantifying all connected virtual machines (VMs) and then shuts them down.

From that point on, the Cheers ransomware begins encryption, placing importance on .log, .vmdk, .vmem, .vswp, and .vmsn files. These types of files are considered valuable in the eyes of the victim and consequently become valuable in the eyes of the attackers.

Interestingly enough, the Cheers ransomware renames the files even before it encrypts them. This way, if access permission has not been granted the actual encryption will not take place.

The ransomware will leave ransom notes in each folder while scanning the directories containing the data to be encrypted. The ransom notes will be named “How To Restore Your Files.txt”.

Recover files encrypted by Cheers ransomware

Digital Recovery has been in the data recovery market for over 23 years. We specialize in creating methods to quickly and efficiently recover files that have been encrypted by ransomware.

We develop solutions that allow us to restore encrypted files on servers, virtual machines, databases, RAID systems, and other devices.

We have created a confidentiality agreement (NDA), which guarantees that your files will not be shared, to provide our customers with complete professional confidentiality.

Digital Recovery is the best option if you are looking for ways to decrypt and recover data that has been encrypted by ransomware.

Contact our experts and get a diagnosis started quickly.

Digital Recovery

Digital Recovery helps companies recover data

Check out other posts

Do you need Data Recovery?

Speak directly to an expert now:

We are always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery