HomeTechnologyNew PathWiper information wiper malware hits vital infrastructure in Ukraine

New PathWiper information wiper malware hits vital infrastructure in Ukraine


New PathWiper information wiper malware hits vital infrastructure in Ukraine

A brand new information wiper malware named ‘PathWiper’ is being utilized in focused assaults in opposition to vital infrastructure in Ukraine, aimed toward disrupting operations within the nation.

The payload was deployed by means of a reliable endpoint administration software, indicating that attackers had achieved administrative entry to the system by means of a previous compromise.

Cisco Talos researchers who found the assault attributed it with excessive confidence to a Russia-linked superior persistent menace (APT).

The researchers evaluate PathWiper to HermeticWiper, beforehand deployed in Ukraine by the ‘Sandworm’ menace group, which had related performance.

Therefore, PathWiper could also be an evolution of HermeticWiper, utilized in assaults by the identical or overlapping menace clusters.

PathWiper’s harmful capabilities

PathWiper executes heading in the right direction programs through a Home windows batch file that launches a malicious VBScript (uacinstall.vbs), that in flip drops and executes the first payload (sha256sum.exe) [VirusTotal].

The execution mimics the habits and names related to a reliable admin software to evade detection.

As a substitute of merely enumerating bodily drives like HermeticWiper, PathWiper programmatically identifies all related drives (native, community, dismounted) on the system.

Subsequent, it abuses Home windows APIs to dismount volumes to arrange them for corruption after which creates threads for every quantity to overwrite vital NTFS buildings.

Among the many focused system recordsdata within the root listing of the NTFS are:

  • MBR (Grasp Boot File): The primary sector of a bodily disk holding the bootloader and partition desk.
  • $MFT (Grasp File Desk): Core NTFS system file that catalogs all recordsdata and directories, together with their metadata and areas on the disk.
  • $LogFile: Journal is used for NTFS transaction logging, monitoring file adjustments, and serving to with integrity checking and restoration.
  • $Boot: File containing boot sector and filesystem structure data.

PathWiper overwrites the above and one other 5 vital NTFS recordsdata with random bytes, rendering impacted programs fully inoperable.

The noticed assaults don’t contain extortion or any type of monetary calls for, so their sole intention is destruction and operational disruption.

Cisco Talos revealed file hashes and snort guidelines to assist detect the menace and cease it earlier than it corrupts the drives.

Knowledge wipers have turn into a robust software in assaults on Ukraine for the reason that struggle started, with Russian menace actors generally utilizing them to disrupt vital operations within the nation.

This contains wipers named DoubleZero, CaddyWiper, HermeticWiper, IsaacWiper, WhisperKill, WhisperGate, and AcidRain.

Handbook patching is outdated. It is gradual, error-prone, and hard to scale.

Be part of Kandji + Tines on June 4 to see why previous strategies fall brief. See real-world examples of how fashionable groups use automation to patch quicker, minimize threat, keep compliant, and skip the complicated scripts.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments