SEXi Ransomware Takes Down a Data Center — No Ransom Paid
IxMetro PowerHost, a data center operator serving customers across the US, South America, and Europe, was hit by SEXi ransomware in April 2024. The attack encrypted VMware ESXi servers and all backups, affecting 1,000 customers and carrying a $140M ransom demand. Proven Data deployed advanced decryption, coordinated recovery across all stakeholders, and forensically confirmed no data was exfiltrated — no ransom was paid.
The Challenge
SEXi ransomware — a strain targeting VMware ESXi infrastructure — encrypted both production servers and all backups at PowerHost, a Chilean data center with international operations. With 1,000 customers' hosted servers and websites offline and a $140 million demand, the incident combined massive operational disruption with extreme extortion pressure. Law enforcement agencies across multiple countries advised against paying.
How We Responded
- 1Rapid Response & Containment
Proven Data deployed experts to PowerHost immediately after the March 30 detection. By April 1, all affected servers were isolated to prevent further encryption spread.
- 2Advanced Decryption for ESXi Infrastructure
Using specialized VMware ESXi decryption techniques, the team worked to recover encrypted data from both production systems and compromised backups.
- 3Multi-Stakeholder Coordination
Recovery was orchestrated across PowerHost's internal IT team, security agencies in multiple countries, and Proven Data — maintaining alignment on strategy and customer communications.
- 4Forensic Investigation
A forensic investigation examined exfiltration indicators across network logs and confirmed that no customer data had been stolen despite the attackers' claims.
- 5Customer Recovery Enablement
PowerHost offered affected customers new VPS environments while restoration progressed, enabling some to resume operations quickly while full decryption continued.
Outcomes
- No ransom paid ($140M demand declined)
- Advanced decryption applied to ESXi infrastructure
- Forensics confirmed zero data exfiltration
- 1,000 affected customers progressed toward recovery
- Coordinated response across international stakeholders
Facing a similar incident?
Our team is available 24/7. We typically begin triage within the hour.
Get emergency helpLearn about our services