• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new bibi windows wiper targets windows systems in pro hamas attacks

New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks

You are here: Home / General Cyber Security News / New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks
November 13, 2023

Cybersecurity scientists have warned about a Windows edition of a wiper malware that was beforehand noticed targeting Linux programs in cyber attacks aimed at Israel.

Dubbed BiBi-Windows Wiper by BlackBerry, the wiper is the Windows counterpart of BiBi-Linux Wiper, which has been put to use by a pro-Hamas hacktivist team in the wake of the Israel-Hamas war past month.

“The Windows variant […] confirms that the risk actors who produced the wiper are continuing to develop out the malware, and implies an growth of the attack to focus on conclude person machines and application servers,” the Canadian firm stated Friday.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Slovak cybersecurity organization is monitoring the actor powering the wiper underneath the name BiBiGun, noting that the Windows variant (bibi.exe) is intended to overwrite data in the C:People directory recursively with junk data and appends .BiBi to the filename.

The BiBi-Windows Wiper artifact is claimed to have been compiled on Oct 21, 2023, two weeks following the onset of the war. The precise process by which it is dispersed is presently unfamiliar.

In addition to corrupting all information with the exception of these with .exe, .dll, and .sys extensions, the wiper deletes shadow copies from the process, efficiently preventing the victims from recovering their data files.

One more notable similarity with its Linux variant is its multithreading capacity.

“For the speediest attainable destruction action, the malware runs 12 threads with 8 processor cores,” Dmitry Bestuzhev, senior director of cyber menace intelligence at BlackBerry, reported.

Cybersecurity

It is not quickly clear if the wiper has been deployed in real-planet attacks, and if so, who the targets are.

The enhancement arrives as Security Joes, which 1st documented BiBi-Linux Wiper, stated the malware is part of a “bigger marketing campaign concentrating on Israeli organizations with the deliberate intent to disrupt their day-to-day operations working with details destruction.”

The cybersecurity business claimed it identified tactical overlaps in between the hacktivist team, who simply call on their own Karma, and yet another geopolitically inspired actor codenamed Moses Team (aka Cobalt Sapling), which is suspected to be of Iranian origin.

“Though the marketing campaign has largely centered around Israeli IT and federal government sectors up to this point, some of the participating groups, these kinds of as Moses Staff, have a history of concurrently concentrating on corporations throughout a variety of business enterprise sectors and geographical destinations,” Security Joes claimed.

Discovered this post interesting? Comply with us on Twitter  and LinkedIn to go through far more exclusive material we article.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «microsoft warns of fake skills assessment portals targeting it job Microsoft Warns of Fake Skills Assessment Portals Targeting IT Job Seekers
Next Post: Major Phishing-as-a-Service Syndicate ‘BulletProofLink’ Dismantled by Malaysian Authorities major phishing as a service syndicate 'bulletprooflink' dismantled by malaysian authorities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.