Yes, but the definition of a hypervisor is that a large amount of blocks get altered on a continuous basis. Moreover, I highly doubt the EDR is even aware of Ceph-type traffic and can integrate into it. Even a QCOW2 file is just 1 file, you only need to encrypt a few blocks to make it completely unusable. Again, what you're describing is on Linux clients where people with browsers do dumb shit, not the hypervisor, and for those, yes, there are EDR. Traffic to C&C servers - it would have to already know (blacklist) those and that seems to me should be an issue that is handled at the edge by IDS integrated into firewalls.
My contention is that once a ransomware gets sufficient rights to even start its attack, it's already too late, it has deep access in your network and root access at that point, if that has happened on your hypervisor, you've been compromised, you need to disconnect your datacenter, wipe your admins computers, you need to wipe your jump hosts, you need to wipe your entire cluster and recover from ... snapshots and backups.
I don't have a problem with EDR as a detection tool, but what you're describing can be picked up by any SIEM as well, and likely when the attacker is just knocking at the door. Allowing it to interfere (kill VMs, hang kernels, add measurable latency to read/write calls etc) has always been an issue for us, especially in clusters, you're potentially hanging the entire cluster because ClownStrike uses its customers to test a dynamic update - this has happened twice on Linux before the notorious Windows outage, it's why, even on VMs we no longer allow EDR to run as a kernel module - it has to use BPF instead.
I would love to hear about a good EDR tool for Linux, one that a) builds the kernel interface regardless of kernel version b) doesn't interfere with legitimate operations and c) can actually detect 'bad behavior' both on the host and in VMs and containers. Right now, it seems most EDR vendors are just there to tick a box that they also have a Linux (and same can be said about Mac) client, but they only detect Windows threats and Windows-like behavior, replicate the same attack in Python, and it won't detect anything.