Data-destroying Malware Target Ukrainian Organizations

Share post:

ESET researchers have uncovered a new strain of data-destroying malware targeting Ukrainian organizations.

Known as CaddyWiper, the malware can wipe data across compromised Windows domains.

Data on the domain controller are not affected during the attack. It is assumed that by not deleting data on the domain controller, the attackers can maintain access inside the compromised networks.

“This new malware erases user data and partition information from attached drives. ESET telemetry shows that it was seen on a few dozen systems in a limited number of organizations,” ESET Research Labs explained.

CaddyWiper is the fourth data wiper deployed in Ukraine in 2022. ESET researchers discovered two other data wipers including HermeticWiper and IsaacWiper.

Microsoft discovered the last of the four data wipers tracked as WhisperGate. WhisperGate was disguised as ransomware and used in data-wiping attacks against Ukraine in mid-January.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways