What you need to know about ransomware threat Zeppelin

Dr Darren Williams, CEO and Founder of ransomware specialist Blackfog, looks at how cybercriminals are using Zeppelin to attack hybrid working companies.

The Federal Bureau of Investigation (FBI) in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA) have issued a new warning on a strain of ransomware targeting companies.

Zeppelin is a high-tech attempt to hold companies' data hostage and the hackers behind it are demanding as much as a million dollars to get data back.

The FBI and CISA warn the targets in this attack are companies with employees working from home.

"Zeppelin ransomware has been particularly interested in targeting the health care industries," said FBI Agent Elvis Chan. "Attackers are looking for cash cows that have weak cybersecurity."

What is Zeppelin?

Dr Darren Williams, CEO and Founder of ransomware specialists Blackfog, offers the following unique insight: “Zeppelin ransomware, a fairly well-known malware strain has been in known use since 2019, often to target a wide range of businesses and critical infrastructure organisations. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars.

"Zeppelin’s unique attack path is such that the FBI have observed the attackers executing the malware multiple times in the network, leaving a great big sting on the victim, who needs multiple unique decryption keys to combat the attack.

 "Attacks on hybrid working companies are nothing new, however it is crucial that employees remember they play a part in protecting themselves and the employer, too."

How to protect yourself from Zeppelin

Williams says: "Attacks from vectors such as Zeppelin often start with a simple phishing email - employers must ensure they educate and remind their employees on cyber security best practices, to minimise attack risk. Standard, good cyber hygiene practice is essential here: remembering to regularly change passwords and use MFA as a basic practice. That said, if a threat actor wants to find their way in, they will! What matters is the data they were able to obtain and leave with.

"Most cybercriminal gangs aim for extortion – organisations should also consider anti-data exfiltration to block the attacker and prevent data from being exfiltrated.”

Share

Featured Articles

Tech & AI LIVE: Key Events that are Vital for Cybersecurity

Connecting the world’s technology and AI leaders, Tech & AI LIVE returns in 2024, find out more on what’s to come in 2024

MWC Barcelona 2024: The Future is Connectivity

Discover the latest in global technology and connectivity at MWC Barcelona 2024, where industry giants converge to discuss 5G, AI and more industry trends

AI-Based Phishing Scams Are On The Rise This Valentine’s Day

Research from Egress Threat Intelligence, Avast, Cequence Security & KnowBe4 outlines how AI is being used in dating app phishing scams on Valentine’s Day

Speaker Lineup Announced for Tech Show London 2024

Technology & AI

Darktrace predicts AI deepfakes and cloud vulnerabilities

Cloud Security

Secure 2024: AI’s impact on cybersecurity with Integrity360

Technology & AI