• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Russian Invasion Sparks Global Wiper Malware Surge

You are here: Home / General Cyber Security News / Russian Invasion Sparks Global Wiper Malware Surge
February 23, 2023

The war in Ukraine has pushed a new wave of destructive malware all-around the entire world, with cybercrime groups progressively delivering it as a support, in accordance to Fortinet.

The security seller claimed that wiper malware quickly expanded previous yr past the borders of Ukraine, the place it is currently being used by Russian forces. Fortinet recorded a 53% enhance in activity from Q3 to Q4 2022.

“These new strains are more and more staying picked up by cyber-felony groups and applied all over the growing Cybercrime-as-a-Assistance (CaaS) network,” defined chief security strategist, Derek Manky.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Cyber-criminals are also now acquiring their possess wiper malware which is remaining utilised commonly throughout CaaS businesses, that means that the menace of wiper malware is a lot more popular than ever and all organizations are a likely concentrate on, not just those based in Ukraine or bordering countries.”

The vendor also warned that menace actors are ever more reusing aged botnet and malware code, in purchase to launch attack strategies more expense effectively.

“Similar to musicians who remix chart-topping tunes, cyber-criminals are reimagining aged attack strains that proved productive in the earlier and reintroducing new and enhanced versions,” spelled out Manky.

“In the 2nd 50 percent of 2022, we witnessed the resurgence of familiar names amid botnets and malware variants, many of which are additional than a yr aged.”

These integrated IoT botnet Mirai, distant entry Trojan Gh0st RAT and the infamous Emotet Trojan, which Manky said experienced now break up into six distinct variants. A different of the leading strains noticed in the 2nd fifty percent of 2022, Lazarus, dates back as considerably as 2010, he claimed.

In other places, Fortinet warned that ransomware continues to pose a main threat to organizations many thanks to the “as-a-service” design (RaaS) utilized to streamline its use in attacks by numerous affiliate teams.

“In the next fifty percent of 2022, the prime five ransomware family members accounted for about 37% of all ransomware. GandCrab, a RaaS malware released in 2018, topped the checklist,” described Manky.

“Despite the threat actors powering GandCrab asserting that they ended up retiring, there were being lots of iterations of GandCrab developed during its heyday. There may well nonetheless be a extensive tail of variants coming from this operation, which tends to make the function of teams like The Cybercrime Atlas Initiative necessary as they purpose to dismantle these big-scale felony operations completely.”


Some pieces of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Phishing Sites and Apps Use ChatGPT as Lure
Next Post: ICO Calls on Accountants to Improve SME Data Protection Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.