monitor_heart Breach Monitoring

Breach Monitoring News Feed

Real-time tracking of threat actors, active data leaks, and cybersecurity incidents across the globe.

Ymir

groups Victims: 0
Yurei

groups Victims: 3
Zeon

groups Victims: 0
Zeoticus

groups Victims: 0
Zeoticus2

groups Victims: 0
Zeppelin

Zeppelin ransomware is a derivative of the Delphi-based Vega malware family and functions as a Ransomware as a Service (RaaS). From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars. Zeppelin actors gain access to victim networks via RDP exploitation [T1133], exploiting SonicWall firewall vulnerabilities [T1190], and phishing campaigns [T1566]. Prior to deploying Zeppelin ransomware, actors spend one to two weeks mapping or enumerating the victim network to identify data enclaves, including cloud storage and network backups [TA0007]. Zeppelin actors can deploy Zeppelin ransomware as a .dll or .exe file or contained within a PowerShell loader. https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-223a

groups Victims: 0
Zero Tolerance Gang (Ztg)

groups Victims: 1
Zerolockersec

groups Victims: 2
Zeta Leaks

groups Victims: 0
Zircon

groups Victims: 0
Zixer2

groups Victims: 0
Zola

groups Victims: 0