It’s very similar to the well-known Locky malware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key.

In fact, the Zepto and Locky malware families are similar enough that when you get to Zepto’s “pay page,” where the crooks tell you how much you need to pay to unscramble your data, you see this:




There is one obvious difference from a Locky infection, however: after a Zepto attack, your files will have been renamed so that they end .zepto. (Locky got its name because it uses the extension.locky instead.)

The idea behind renaming all your files is so that you can see just how much is at stake if you don’t pay up.

You can see not only how near you are to recovering your precious data, but also just how far.

How Zepto arrives

In the past week, we’ve seen variants of Zepto distributed in two main ways, both of which are commonly used by ransomware criminals:

  • In emails with an attached ZIP archive.
  • In emails with an attached DOCM file.

In the first case, opening up the ZIP archive will unpack a file with a .JS (JavaScript) extension.

If JavaScript seems like a strange format for an attachment that claims to be a document, remember that Windows suppresses the .JS part of the name by default, and shows the file with an icon that gives the impression of a text file:

Opening the JavaScript file, however, runs the script program inside, which in turn downloads the ransomware as an EXE (Windows program) file, and runs it.

In the second case, the attachment is DOCM, so that double-clicking on the file opens it by default in Microsoft Word.

But DOCM is short for “document with macros,” a special type of document that contains embedded scripts written in VBA (Visual Basic for Applications).

VBA is a programming language that has many similarities with JavaScript, and that can be used for much the same purposes, including spreading malware.

Macros inside a Word file don’t run by default (a security precaution introduced many years ago by Microsoft), but they do produce a prompt like the one here, as good as inviting you to use the[Options] button to adjust your security settings.

In the recent Zepto attacks we’ve seen, the booby-trapped documents were blank, opening rather unusually to an empty page:

Most documents that carry macro-based ransomware include some sort of explanation or excuse to encourage you to click [Options] and change your security settings – often, ironically, under the guise of improving security somehow.

Here, the crooks have kept quiet, hoping you’ll click on [Options] of your own accord.

We’re not sure whether this was by accident (because they forgot to include explanatory instructions), or by design (to avoid the sort of message that has become widely associated with ransomware).

Enabling macros has the same side-effect as opening the JavaScript file above: the VBA script downloads the ransomware as an EXE (Windows program) file, and runs it.

Sophos products detect and block these attack vectors under a variety of names, including: Mal/DrodZp-A (attached ZIP files), Troj/JSDldr-LU (JavaScript downloaders inside the ZIPs), Troj/DocDl-DUN (attached Word macro files),Mal/Ransom-EM and Troj/Ransom-DJF (the ransomware EXE files).

Time to pay

Much like Locky, Zepto starts off by “calling home” to a web server run by the crooks, from which it downloads an encryption key to scramble your data.

The crooks keep the corresponding decryption key to themselves, which is what they later offer to sell back to you. (See above, where the asking price is half a bitcoin – BTC 0.5, currently about $300.)

Your data files are both scrambled and renamed, so that encrypted files end up with names that look like this:


The first half of each name is the same for every file, and is a unique identifier that tells the crooks who you are if you decide to pay up to get your data back.

After your files are scrambled, Zepto presents a “how to pay” message, to make very sure you know that you can recover your data for a fee.

The message appears in three different ways: as your desktop wallpaper; in an image that’s opened up in the Windows Photo Viewer; and as an HTML page that’s saved into every directory where files have been scrambled.

The personal identification ID in the “how to pay” message is the same as the first half of each scrambled filename.

Following the instructions in _HELP_instructions.html takes you to the “pay page” shown at the start of the article.

What to do?

We regularly offer advice on preventing (and recovering from) attacks by ransomware and other nasties.

See Our blog for useful tips on how to keep yourself safe