Zeppelin is the newest member of the Delphi-based Ransomware-as-a-Service (RaaS) family initially known as Vega or VegaLocker. Zeppelin appears to be highly configurable and can be deployed as an EXE, DLL, or wrapped in a PowerShell loader. The samples are spread via malspam and are hosted on water-holed websites and, in the case of PowerShell, on Pastebin. There are reasons to believe at least some of the attacks were conducted through MSSPs, which would bear similarities to another recent highly targeted campaign that used a ransomware called Sodinokibi.
There is a major shift in their targets from Russian-speaking to Western countries, as well as differences in victim selection and malware deployment methods. Earlier this month, the ransomware targeted healthcare and IT.
Indicators of compromise are given below. However, the URLs for this domain were found clean while the files communicating with it were found to be malicious.
Block the threat indicators at their respective controls.