Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

Posted on February 2, 2026February 2, 2026 By CWS

A harmful new data-wiping malware generally known as DynoWiper has emerged, focusing on vitality firms in Poland with harmful assaults designed to completely erase vital knowledge.

The malware surfaced in December 2025 when safety researchers detected its deployment at a Polish vitality agency.

In contrast to typical ransomware that encrypts recordsdata for financial acquire, DynoWiper operates with a single harmful function: to overwrite and destroy knowledge throughout compromised networks, rendering methods fully unbootable.

The assault represents a regarding escalation in cyber threats towards vital infrastructure.

DynoWiper was deployed by a number of variants, together with recordsdata named schtask.exe, schtask2.exe, and an replace executable, all launched on December 29, 2025.

The attackers made a number of makes an attempt to execute the malware after preliminary failures, modifying the code every time to bypass safety defenses.

Nevertheless, the put in endpoint detection and response product efficiently blocked execution, considerably limiting the injury.

Welivesecurity analysts recognized putting similarities between DynoWiper and a beforehand recognized wiper referred to as ZOV, which was used towards Ukrainian targets earlier.

The analysis group attributed DynoWiper to Sandworm, a Russia-aligned risk group infamous for conducting harmful cyberattacks towards vitality firms.

Wallpaper dropped by the ZOV wiper (Supply – Welivesecurity)

Sandworm, generally linked to Unit 74455 of the Russian Principal Intelligence Directorate (GRU), has an extended historical past of focusing on vital infrastructure throughout Jap Europe.

The malware operates by a calculated three-phase destruction course of. In the course of the first section, DynoWiper recursively searches for recordsdata on all fastened and detachable drives whereas excluding sure system directories to take care of momentary system performance.

The wiper makes use of a 16-byte buffer containing random knowledge to overwrite file contents. Information smaller than 16 bytes are fully overwritten, whereas bigger recordsdata have parts of their contents destroyed to hurry up the destruction course of.

Deployment By means of Energetic Listing Exploitation

DynoWiper’s an infection mechanism demonstrates refined community penetration capabilities. The attackers exploited Energetic Listing Group Coverage to distribute the malware throughout the compromised community.

This deployment technique requires Area Admin privileges, highlighting the risk group’s capability to achieve high-level entry to focused organizations.

The malware was positioned in a shared community listing, permitting execution throughout a number of machines concurrently.

Previous to deploying the wiper, attackers used credential-stealing instruments like Rubeus and tried to dump the LSASS course of reminiscence utilizing Home windows Process Supervisor. In addition they deployed a SOCKS5 proxy instrument referred to as rsocx to determine reverse connections with exterior servers.

This multi-stage strategy demonstrates cautious planning and reconnaissance earlier than launching the ultimate harmful payload.

Organizations within the vitality sector ought to implement strict entry controls, community segmentation, and steady monitoring to detect such refined intrusion makes an attempt earlier than wipers will be deployed.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Companies, Data, DataWiping, Destroy, DynoWiper, Energy, Malware

Post navigation

Previous Post: 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
Next Post: Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Related Posts

New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems Cyber Security News
New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials Cyber Security News
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Microsoft Patch Tuesday January 2026 Microsoft Patch Tuesday January 2026 Cyber Security News
SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark