On Aug. 11, 2022, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory (CSA) about the Zeppelin ransomware. Operating as a Ransomware as a Service (RaaS), the ransomware is a version of the Delphi-based Vega malware family. The agencies noted that malicious actors have used the ransomware for the past three years to target several businesses and infrastructure organizations, “especially organizations in the healthcare and medical industries.” The statement also indicated that initial ransom payment requests ranged from several thousand dollars to over a million dollars, and the actors have been known to request ransom payments in Bitcoin.
By exploiting SonicWall firewall vulnerabilities, taking advantage of remote desktop protocol (RDP) exploitation, and employing phishing attempts, Zeppelin threat actors are able to gain access to targeted networks. However, for approximately one to two weeks before unleashing the attack, the threat actors survey the targeted victim network “to identify data enclaves, including cloud storage and network backups,” the CSA explained. Plus, prior to encrypting the files, threat actors “exfiltrate sensitive company data files to sell or publish in the event the victim refuses to pay the ransom.” The FBI and CISA also issued recommended mitigations to help reduce the risk of a Zeppelin ransomware infection. Some of the recommendations include: The last recommendation is critical in your network’s protection against this specific strain of ransomware. In the joint CSA, officials stated the FBI has seen situations where threat actors “executed their malware multiple times within a victim’s network, resulting in the creation of different IDs or file extensions, for each instance of an attack.” As a result, the victim would need multiple decryption keys.