Ukraine has arrive under a refreshing cyber onslaught from Russia that associated the deployment of a earlier undocumented Golang-primarily based info wiper dubbed SwiftSlicer.
ESET attributed the attack to Sandworm, a country-state group connected to Armed forces Device 74455 of the Major Intelligence Directorate of the Normal Employees of the Armed Forces of the Russian Federation (GRU).
“The moment executed it deletes shadow copies, recursively overwrites files situated in %CSIDL_System%motorists, %CSIDL_Procedure_Push%WindowsNTDS and other non-program drives and then reboots computer,” ESET disclosed in a collection of tweets.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The overwrites are accomplished by working with randomly generated byte sequences to fill 4,096 byte-duration blocks. The intrusion was discovered on January 25, 2023, the Slovak cybersecurity corporation included.
Sandworm, also tracked beneath the monikers BlackEnergy, Electrum, Iridium, Iron Viking, TeleBots, and Voodoo Bear, has a historical past of staging disruptive and damaging cyber campaigns targeting businesses globally given that at the very least 2007.
The sophistication of the menace actor is evidenced by its various distinct eliminate chains, which comprise a extensive assortment of personalized resources these as BlackEnergy, GreyEnergy, Industroyer, NotPetya, Exaramel, and Cyclops Blink.
In 2022 alone, coinciding with Russia’s navy invasion of Ukraine, Sandworm has unleashed WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, Industroyer2, Status, and RansomBoggs from critical infrastructure in Ukraine.
“When you feel about it, the growth in wiper malware for the duration of a conflict is barely a surprise,” Fortinet FortiGuard Labs researcher Geri Revay explained in a report revealed this 7 days. “It can scarcely be monetized. The only practical use case is destruction, sabotage, and cyberwar.”
The discovery of SwiftSlicer details to the constant use of wiper malware variants by the Russian adversarial collective in attacks built to wreak havoc in Ukraine.
The enhancement also comes as the Laptop or computer Emergency Response Workforce of Ukraine (CERT-UA) joined Sandworm to a modern mainly unsuccessful cyberattack on the nationwide news agency Ukrinform.
The intrusion, which is suspected of acquiring been carried out no afterwards than December 7, 2022, entailed the use of 5 different items of info wiping courses, namely CaddyWiper, ZeroWipe, SDelete, AwfulShred, and BidSwipe targeting Windows, Linux, and FreeBSD devices.
“It was founded that the last phase of the cyberattack was initiated on January 17, 2023,” CERT-UA explained in an advisory. “However, it had only partial results, in certain, in relation to various knowledge storage systems.”
Sandworm is not the only group that has its eyes on Ukraine. Other Russian point out-sponsored actors these types of as APT29, COLDRIVER, and Gamaredonhave actively specific a vary of Ukrainian organizations given that the onset of the war.
Located this report exciting? Comply with us on Twitter and LinkedIn to study much more distinctive content material we write-up.
Some components of this write-up are sourced from:
thehackernews.com