Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

New Wiper Malware Targeting Ukraine Amid Russia’s Military Operation

Wiper Malware Targeting Ukraine

Cybersecurity firms ESET[1]
and Broadcom’s Symantec[2] said they discovered a
new data wiper malware used in fresh attacks against hundreds of
machines in Ukraine, as Russian forces formally launched a full-scale[3]
military
operation
[4] against the country.

The Slovak company dubbed the wiper “HermeticWiper[5]” (aka
KillDisk.NCV), with one of the malware samples
compiled on December 28, 2021, implying that preparations for the
attacks may have been underway for nearly two months.

“The wiper binary is signed using a code signing certificate
issued to Hermetica Digital Ltd,” ESET said in a series of tweets.
“The wiper abuses legitimate drivers from the EaseUS Partition
Master software in order to corrupt data. As a final step the wiper
reboots [the] computer.”

Automatic GitHub Backups

At least one of the intrusions involved deploying the malware
directly from the Windows domain controller, indicating that the
attackers had taken control of the target network.

The scale and the impact of the data-wiping attacks remains
unknown as yet, as is the identity of the threat actor behind the
infections. But the development marks the second time this year
that a destructive malware has been deployed on Ukrainian computer
systems after the WhisperGate[6]
operation in mid-January.

The wiper attacks also follow a third “massive” wave[7]
of distributed denial-of-service (DDoS) attacks that hit several
Ukrainian government and banking institutions on Wednesday,
knocking out online portals for the Ministry of Foreign Affairs,
Cabinet of Ministers, and Rada, the country’s parliament.

Wiper Malware

Last week, two of the largest Ukrainian banks, PrivatBank and
Oschadbank, as well as the websites of the Ukrainian Ministry of
Defense and the Armed Forces suffered outages as a result[8]
of a DDoS attack[9]
from unknown actors, prompting the U.K.[10] and U.S.[11] governments to point
the fingers at the Russian Main Intelligence Directorate (GRU), an
allegation the Kremlin has denied[12].

Wiper Malware

Campaigns that use DDoS attacks deliver torrents of junk traffic
that are intended to overwhelm targets with the goal of rendering
them inaccessible. A subsequent analysis of the February 15
incidents by the CERT-UA found[13] that they were carried
out using botnets such as Mirai[14] and Mēris[15] by leveraging compromised MikroTik routers[16] and other IoT
devices.

Prevent Data Breaches

What’s more, information systems belonging to Ukraine’s state
institutions are said to have been unsuccessfully targeted in as
many as 121 cyber attacks[17] in January 2022
alone.

That’s not all. Cybercriminals on the dark web are looking to
capitalize on the ongoing political tensions by advertising
databases and network accesses containing information on Ukrainian
citizens and critical infra entities on RaidForums and Free
Civilian marketplaces in “hopes of gaining high profits,” according
to a report[18] published by Accenture
earlier this week.

The continuous onslaught[19] of disruptive malicious
cyber acts since the start of the year has also led the Ukrainian
law enforcement authority to paint the attacks as an effort to
spread anxiety, undermine confidence in the state’s ability to
defend its citizens, and destabilize its unity.

“Ukraine is facing attempts to systematically sow panic, spread
fake information and distort the real state of affairs,” the
Security Service of Ukraine (SSU) said[20] on February 14. “All
this combined is nothing more than another massive wave of hybrid
warfare.”

References

  1. ^
    ESET
    (twitter.com)
  2. ^
    Symantec
    (twitter.com)
  3. ^
    full-scale
    (twitter.com)
  4. ^
    military operation
    (www.reuters.com)
  5. ^
    HermeticWiper
    (twitter.com)
  6. ^
    WhisperGate
    (thehackernews.com)
  7. ^
    third
    “massive” wave
    (cip.gov.ua)
  8. ^
    result
    (cip.gov.ua)
  9. ^
    DDoS
    attack
    (twitter.com)
  10. ^
    U.K.
    (www.gov.uk)
  11. ^
    U.S.
    (www.youtube.com)
  12. ^
    the
    Kremlin has denied
    (www.kyivpost.com)
  13. ^
    found
    (cert.gov.ua)
  14. ^
    Mirai
    (thehackernews.com)
  15. ^
    Mēris
    (thehackernews.com)
  16. ^
    compromised MikroTik routers
    (thehackernews.com)
  17. ^
    121
    cyber attacks
    (ssu.gov.ua)
  18. ^
    report
    (www.accenture.com)
  19. ^
    continuous onslaught
    (thehackernews.com)
  20. ^
    said
    (ssu.gov.ua)

Read more