Friday, April 11, 2025
HomeMalwareHackers Using Remote Desktop Application To Install "Zeppelin" Ransomware & Encrypt Windows...

Hackers Using Remote Desktop Application To Install “Zeppelin” Ransomware & Encrypt Windows Files

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals abusing a Remote Desktop application ConnectWise Control that previously known as (ScreenConnect) to deliver the Zeppelin Ransowmare (aka Vega) and encrypt the victim’s files in Windows PC.

ConnectWise is a remote desktop software mostly used in the enterprise network and MSPs to connect the systems remotely for support. You’ll also find session recording and screen sharing with this remote access program. 

ConnectWise Control already abused by hackers to breach the largest IT service provider Wipro network and gained access to Wipro systems.

- Advertisement - Google News

GBHackers recently reported that the Zeppelin ransomware campaign targets IT and healthcare companies in Europe and the U.S.

The newly observed campaign now expand its operation and targeting the real estate industries, and it employed the additional info-stealers, and Cobalt beacons to deliver the ransomware payload.

Researchers observed that the attackers try to exfiltrate the information from the Windows database server by stealing the backup information and propagate the ransomware across the network.

Zeppelin Ransomware Module

Initially, Zeppelin ransomware deliver via ScreenConnect remote desktop control application.

Once ScreenConnect CMD shell gets executed, ScreenConnect service creates and executes a temporarily hidden run.cmd file that contains the remotely executed commands.

Later the attackers execute the PowerShell command to download the next stage of the command from the C2 server hxxp://45.142.213[.]167/oxf where it again connect the C2 server to downloads the Zeppelin ransomware artifact. 

Zeppelin

According to Morphisec report, As part of different campaigns, we observed the adversary using two versions for each ransomware or stealer variant. In this specific campaign, we identified the same ransomware delivered in packed (with a custom packer framework) and unpacked ways.

The ransomware also using the delivery method such as vidar info stealer, cobalt strike beacons, PS2EXE tools, banker trojans from the same IP and one more IP hosted through colocation services.

Attackers also having a list of commands to stop the database process to prevent the victims the replace the backup with the infected data.

You can read here the complete infection process of Zeppelin ransomware.

Indicators of Compromise

CFCBD89AC2A32EF179CB39ABB569A952P1.exe (Info stealer)
BFDFD9874072B6340660B501F1BD7A33P2.exe
FEE6BA9A0D7A805B3281D4F955821C1COxfordnew.exe (Zeppelin)
A8E670C63E257049A7BCAE632C9ACEF6Oxford.exe (Zeppelin)
0E06F623BC4EEFA97A84EDEDFBB6BB7EWork.exe
3F120DE1249E8724EC1C1EF255F26067Rdp.exe (PS2EXE)
0D442C4D8B4C4312840675CAC8D69661Vid.exe (Vidar)
58F53C8034A1E0AC1174595909DDF88CVids.exe
386157F4CAB9327D01A7210DA9237EF0Zeppelin.exe
357B149A0F40224DB5D359DB104A6778doe_install.exe
68CCFAF0F453CC45FAAA8F653AB9C9834.exe
AED10704BFB8F9EFF057D5523B9AD431Artvnch.exe
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further...

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers,...

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against...