The FBI and Cybersecurity and Infrastructure Security Agency yesterday urged organizations to take steps to protect against Zeppelin ransomware attacks, which use remote desktop protocol and firewall vulnerabilities and phishing campaigns to access victim networks and deploy ransomware.
“The Zeppelin ‘Ransomware as a Service’ is especially targeting health care and medical organizations,” said John Riggi, AHA national advisor for cybersecurity and risk. “The alert contains very detailed and actionable indicators of compromise which should be immediately loaded in organizations network defense systems. Along with encrypting files, this gang is engaging in the ‘double layered’ data extortion method. It appears this gang is stealing and threatening to publicly release sensitive information such as patient information, payroll, human resources and non-disclosure-protected information. Thus, even if a victim organization can independently restore encrypted files from backup, they face the dilemma of potential public release of stolen information in the possession of the criminals. The AHA, along with the federal government, strongly discourages the payment of ransom. This alert along with the comprehensive #stopransomware site provide extensive guidance on how to protect your systems from ransomware and avoid the ethical and legal dilemma of ‘pay, not pay.’”
For more information on this or other cyber and risk issues, contact Riggi at email@example.com.