Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A new variant of the VegaLocker/Buran Ransomware called Zeppelin has been spotted infecting U.S. and European health and IT companies via targeted installs. This ransomware family was promoted as Ransomware-as-a-Service (RaaS) in May 2019 on Russian malware and hacker forums. Affiliates who joined the RaaS would earn 75% of the ransom payment, while the Buran operators would earn 25%.
In some of the attacks, the attackers targeted MSPs in order to further infect customers via management software. It is not known exactly how the Zeppelin ransomware is being distributed, but it is likely through Remote Desktop servers that are publicly exposed to the Internet.
The ransomware will first begin to terminate various processes including ones associated with database, backup, and mail servers. When encrypting files, the ransomware will not append an extension and the file name will remain the same. It will, though, include a file marker called Zeppelin that may be surrounded by different symbols depending on the hex editor and character format you are using.
While encrypting files, it will create ransom notes named !!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT that contain information regarding what has happened to the victim’s files. These notes will also contain email addresses that the victim can contact for payment instructions or to test decrypting one file for free. Below is the ransom note found on victim’s system.
Files Encryption
Domain Name
SHA-256
URL
Block the threat indicators at their respective controls.