Zyxel vulnerability exploited by 'Helldown' ransomware group
Jan. 22, 2025, 9:46 a.m.
Description
The article details a cybersecurity incident where the "Helldown" ransomware group exploited a vulnerability in Zyxel firewall devices. The attackers gained administrator access to the firewall console, collected domain credentials, and compromised the infrastructure. They used VPN services to mask their origin and created additional users for persistent access. The threat actors employed tools like Advanced IP Scanner and Mimikatz for network discovery and credential theft. Multiple ransomware variants were deployed, encrypting both Windows and ESXi systems. The attack methodology included manual commands on the ESXi server to terminate VM processes before encryption. The article provides a comprehensive breakdown of the attack chain, including IP addresses, malware files, and MITRE ATT&CK techniques used by the Helldown group.
Tags
Date
- Created: Jan. 22, 2025, 9:10 a.m.
- Published: Jan. 22, 2025, 9:10 a.m.
- Modified: Jan. 22, 2025, 9:46 a.m.
Attack Patterns
- LB3.exe
- e_win.exe
- enc-esxi
- Advanced IP Scanner
- Mimikatz
- Helldown
- T1078.001
- T1021.002
- T1136.001
- T1078.002
- T1021.001
- T1053.005
- T1490
- T1018
- T1059.004
- T1070.004
- T1486
- T1105
- T1570
- T1098
- T1190
- T1003
Additional Informations
- Singapore
- Italy