Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

Posted on February 2, 2026February 2, 2026 By CWS

A harmful new data-wiping malware generally known as DynoWiper has emerged, focusing on vitality firms in Poland with harmful assaults designed to completely erase vital knowledge.

The malware surfaced in December 2025 when safety researchers detected its deployment at a Polish vitality agency.

In contrast to typical ransomware that encrypts recordsdata for financial acquire, DynoWiper operates with a single harmful function: to overwrite and destroy knowledge throughout compromised networks, rendering methods fully unbootable.

The assault represents a regarding escalation in cyber threats towards vital infrastructure.

DynoWiper was deployed by a number of variants, together with recordsdata named schtask.exe, schtask2.exe, and an replace executable, all launched on December 29, 2025.

The attackers made a number of makes an attempt to execute the malware after preliminary failures, modifying the code every time to bypass safety defenses.

Nevertheless, the put in endpoint detection and response product efficiently blocked execution, considerably limiting the injury.

Welivesecurity analysts recognized putting similarities between DynoWiper and a beforehand recognized wiper referred to as ZOV, which was used towards Ukrainian targets earlier.

The analysis group attributed DynoWiper to Sandworm, a Russia-aligned risk group infamous for conducting harmful cyberattacks towards vitality firms.

Wallpaper dropped by the ZOV wiper (Supply – Welivesecurity)

Sandworm, generally linked to Unit 74455 of the Russian Principal Intelligence Directorate (GRU), has an extended historical past of focusing on vital infrastructure throughout Jap Europe.

The malware operates by a calculated three-phase destruction course of. In the course of the first section, DynoWiper recursively searches for recordsdata on all fastened and detachable drives whereas excluding sure system directories to take care of momentary system performance.

The wiper makes use of a 16-byte buffer containing random knowledge to overwrite file contents. Information smaller than 16 bytes are fully overwritten, whereas bigger recordsdata have parts of their contents destroyed to hurry up the destruction course of.

Deployment By means of Energetic Listing Exploitation

DynoWiper’s an infection mechanism demonstrates refined community penetration capabilities. The attackers exploited Energetic Listing Group Coverage to distribute the malware throughout the compromised community.

This deployment technique requires Area Admin privileges, highlighting the risk group’s capability to achieve high-level entry to focused organizations.

The malware was positioned in a shared community listing, permitting execution throughout a number of machines concurrently.

Previous to deploying the wiper, attackers used credential-stealing instruments like Rubeus and tried to dump the LSASS course of reminiscence utilizing Home windows Process Supervisor. In addition they deployed a SOCKS5 proxy instrument referred to as rsocx to determine reverse connections with exterior servers.

This multi-stage strategy demonstrates cautious planning and reconnaissance earlier than launching the ultimate harmful payload.

Organizations within the vitality sector ought to implement strict entry controls, community segmentation, and steady monitoring to detect such refined intrusion makes an attempt earlier than wipers will be deployed.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Companies, Data, DataWiping, Destroy, DynoWiper, Energy, Malware

Post navigation

Previous Post: 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
Next Post: Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Related Posts

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users Cyber Security News
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Vibe-Coded Malware Campaign Exploits AI to Spread Vibe-Coded Malware Campaign Exploits AI to Spread Cyber Security News
ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates Cyber Security News
Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Cyber Security News
New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark