Helldown ransomware exploits Zyxel VPN flaw to breach networks

The brand new ‘Helldown’ ransomware operation is believed to focus on vulnerabilities in Zyxel firewalls to breach company networks, permitting them to steal information and encrypt gadgets.

French cybersecurity agency Sekoia is reporting this with medium confidence based mostly on latest observations of Helldown assaults.

Though not among the many main gamers within the ransomware area, Helldown has rapidly grown since its launch over the summer time, itemizing quite a few victims on its information extortion portal.

Victim announcements
Sufferer bulletins
Supply: Sekoia

Helldown discovery and overview

Helldown was first documented by Cyfirma on August 9, 2024, after which once more by Cyberint on October 13, each briefly describing the brand new ransomware operation.

The primary report of a Linux variant of the Helldown ransomware concentrating on VMware recordsdata got here from 360NetLab safety researcher Alex Turing on October 31.

The Linux variant options code to listing and kill VMs to encrypt photos, nevertheless, its features are solely partially invoked, indicating that it would nonetheless be below improvement.

Tweet

Sekoia studies that Helldown for Home windows relies on the leaked LockBit 3 builder and options operational similarities to Darkrace and Donex. Nonetheless, no definitive connection may very well be made based mostly on the out there proof.

Configuration files similarities
Configuration recordsdata similarities
Supply: Sekoia

As of November 7, 2024, the risk group listed 31 victims on its recently-renewed extortion portal, primarily small and medium-sized companies based mostly in the USA and Europe. As of at the moment, the quantity has decreased to twenty-eight, doubtlessly indicating some had paid a ransom.

Sekoia says Helldown is not as selective within the information it steals as different teams following extra environment friendly techniques and publishes giant information packs on its web site, reaching as much as 431GB in a single occasion.

One of many victims listed is Zyxel Europe, a networking and cybersecurity options supplier.

The group’s encryptors don’t seem very superior, with the risk actors using batch recordsdata to finish duties relatively than incorporating this performance straight into the malware.

Terminating processes through a batch file
Terminating processes by way of a batch file
Supply: BleepingComputer

When encrypting recordsdata, the risk actors will generate a random sufferer string, equivalent to “FGqogsxF,” which might be used because the extension for encrypted recordsdata. The ransom notice additionally makes use of this sufferer string in its filename, like “Readme.FGqogsxF.txt”.

Helldown's ransom note
Helldown’s ransom notice
Supply: BleepingComputer

Proof pointing to Zyxel exploitation

Working its means from a Zyxel Europe lead, Sekoia discovered that no less than eight victims listed on the Helldown web site used Zyxel firewalls as IPSec VPN entry factors on the time of their breach.

Subsequent, Sekoia seen {that a} Truesec report from November 7 mentions using a malicious account named ‘OKSDW82A’ in Helldown assaults and in addition a configuration file (‘zzz1.conf’) used as a part of an assault concentrating on MIPS-based gadgets, probably Zyxel firewalls.

The risk actors used this account to determine a safe connection through SSL VPN into the sufferer’s networks, entry area controllers, transfer laterally, and switch off endpoint defenses.

By investigating additional, Sekoia discovered studies of the creation of suspicious person account ‘OKSDW82A’ and configuration file ‘zzz1.conf’ on Zyxel boards, the place the system’s admins reported they had been utilizing firmware model 5.38.

Connecting the dots in Helldown activity
Connecting the dots in Helldown exercise
Supply: Sekoia

Based mostly on the model, Sekoia’s researchers hypothesize that Helldown is likely to be utilizing CVE-2024-42057, a command injection in IPSec VPN that permits an unauthenticated attacker to execute OS instructions with a crafted lengthy username in Person-Based mostly-PSK mode.

The difficulty was fastened on September 3 with the discharge of firmware model 5.39, and exploitation particulars haven’t been made public as of but, so Helldown is suspected of gaining access to personal n-day exploits.

Moreover, Sekoia found payloads uploaded to VirusTotal from Russia between October 17 and 22, however the payload was incomplete.

“It contains a base64-encoded string which, when decoded, reveals an ELF binary for the MIPS architecture,” explains Sekoia researcher Jeremy Scion.

“The payload, however, appears to be incomplete. Sekoia assess with medium confidence this file is likely connected to the previously mentioned Zyxel compromise.”

BleepingComputer contacted Zyxel with questions on these assaults however has not obtained a response presently.

Recent articles