Wiper malware has been detected abusing legitimate drivers and targeting Active Directory servers amid ongoing Russian military conflict in Ukraine. The campaign reflects a growing trend of malware use during geopolitical crises with organizations urged to mitigate risks.
Discovered by ESET researchers on February 23, the malware, named HermeticWiper, has been installed on hundreds of machines in the country and indicates that there is no longer a distinction between cybersecurity and international security during crises. This follows recent DDoS attacks against several Ukrainian websites, the deployment of an EU cyber rapid-response team committed to helping defend Ukraine from cyberattacks, and warnings of potential ransomware attacks against US organizations in the wake of new sanctions placed on Russian banks and elites by President Biden.
More Stories
Brits Lose £106m to Romance Fraud in a Year
New City of London Police data reveals British men and women lost over £100m to romance fraudsters in 2024 Read...
What Is Cyber Risk
Did you know that it is estimated that 45% of organizations worldwide will have suffered attacks on their software supply...
Threat Actors Target Victims with HijackLoader and DeerStealer
Cyber-attacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix Read More
Archetyp Market Shut Down in Europe-wide Law Enforcement Operation
Operation DEEP Sentinel has shut down Archetyp Market, the longest-running dark web drug marketplace Read More
Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
Nessus users should update patches as soon as possible Read More
Anubis Ransomware Adds File-Wiping Capability
Trend Micro identified a novel “wipe mode” included in Anubis ransomware to prevent file recovery, increasing pressure on victims to...