• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Warns of Destructive Malware Campaign Targeting Ukraine

You are here: Home / General Cyber Security News / Microsoft Warns of Destructive Malware Campaign Targeting Ukraine
January 17, 2022

Microsoft has detected a major malware wiper campaign targeting authorities, IT and non-earnings companies across Ukraine.

Dubbed “WhisperGate,” the attacks have been very first noticed on January 13, at all around the identical time that over a dozen governing administration internet sites were forced offline in what was explained as a “massive” cyber-attack.

Despite the fact that Microsoft said it had not noticed any back links involving the damaging malware campaign, tracked as DEV-0586, and prior identified exercise groups, it arrives at a time of heightened tensions with Russia, which is once again threatening Ukraine with invasion.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The malware, “which is built to glance like ransomware but lacking a ransom recovery mechanism,” has been uncovered on “dozens” of techniques, though it might have distribute far wider, Microsoft warned.

“The two-phase malware overwrites the Learn Boot Report (MBR) on target methods with a ransom be aware (Stage 1). The MBR is the aspect of a hard travel that tells the personal computer how to load its working process. The ransom notice incorporates a Bitcoin wallet and Tox ID (a exclusive account identifier utilized in the Tox encrypted messaging protocol) that have not been formerly observed by the Microsoft Danger Intelligence Center (MSTIC),” the site submit pointed out.

“The malware executes when the linked unit is run down. Overwriting the MBR is atypical for cybercriminal ransomware. In reality, the ransomware notice is a ruse, and that the malware destructs MBR and the contents of the files it targets.”

The second stage malware is hosted on a Discord channel and made to find specific file extensions, overwrite the contents, and rename the file with a random four-byte extension.

Microsoft urged affected corporations to research for the related IoCs, look into any anomalous authentication exercise and permit multi-factor authentication (MFA) and controlled folder accessibility (CFA) in Microsoft Defender to avert MBR modification.

Senior manager for tactical defense at F-Secure, Calvin Gan, argued that WhisperGate has echoes of the notorious NotPetya campaign tied to the Russian condition.

“With the usage of wiper malware, it is distinct that the attackers are not following economic obtain but are a lot more motivated to cripple the concentrate on functions. Overwriting the MBR would render the equipment unbootable, so building restoration unattainable, especially when the malware also overwrites file contents in advance of overwriting the MBR,” he explained.

“While the attacker’s accurate intention of deploying wiper ransomware coupled with file corrupter is not identified at the instant, possessing it targeting government organizations and associated establishments is a sign that they want operations in these companies ceased right away. Potentially the Bitcoin wallet deal with and communication channel in the ransom take note of WhisperGate is a smokescreen to divert the focus of the attacker’s legitimate intention of the attack whilst making it more difficult to track them.”


Some parts of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «dark web's largest marketplace for stolen credit cards is shutting Dark Web’s Largest Marketplace for Stolen Credit Cards is Shutting Down
Next Post: Two Years for Romance Fraudster Who Targeted 670 Women Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops
  • Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware
  • IT Pro News In Review: Job losses at Arm, warnings over Kaspersky software, Microsoft using ads
  • Google exposes ‘uniquely personal’ access broker behind worst Conti, FIN12 ransomware attacks
  • NCSC Launches Awareness Campaign to Strengthen Password Practices
  • Cyclops Blink Malware Expands to Target Asus
  • Aircraft Disrupted by Satellite Jamming Following Russian Invasion
  • Cloud-Based Email Threats Surge 50% in 2021
  • Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang
  • New Variant of Russian Cyclops Blink Botnet Targeting ASUS Routers

Copyright © TheCyberSecurity.News, All Rights Reserved.