Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

Posted on June 6, 2025June 6, 2025 By CWS

Russian menace actors are as soon as once more focusing on Ukraine’s vital infrastructure with damaging malware, a recent report from Cisco Talos reveals.

Wiper assaults towards Ukraine had been executed in January and February 2022, in coordination with Russia’s assault on the nation, with malware similar to WhisperGate, HermeticWiper, IsaacWiper and CaddyWiper recognized and analyzed. In April, Industroyer2 was used towards industrial management methods (ICS).

As Russia intensified its actions in our on-line world, the assaults continued and Ukraine’s largest cell community operator, Kyivstar, had its IT infrastructure partially destroyed in a December 2023 cyberattack.

Now, Talos says a vital infrastructure entity inside Ukraine fell sufferer to a damaging assault through which new malware, dubbed PathWiper, was used.

The brand new malware shares similarities with HermeticWiper, which has been attributed to Sandworm, additionally tracked as Seashell Blizzard, APT44, Iridium, TeleBots, and Voodoo Bear, an APT group related to GRU, Russia’s army intelligence.

Each wipers, Talos explains, goal the grasp boot document (MBR) and NTFS-related artifacts for corruption, albeit the mechanisms differ. PathWiper seeks all linked drives and volumes, identifies quantity labels, and paperwork legitimate information, whereas HermeticWiper merely enumerates bodily drives from 0 to 100.

As a part of the PathWiper assault, a legit endpoint administration framework was used to execute malicious instructions and deploy the wiper. The attackers used filenames and actions mimicking these of the utility’s console.

“Any instructions issued by the executive device’s console had been acquired by its shopper operating on the endpoints. The shopper then executed the command as a batch (BAT) file, with the command line partially resembling that of Impacket command executions, although such instructions don’t essentially point out the presence of Impacket in an setting,” Talos explains.Commercial. Scroll to proceed studying.

When executed, PathWiper tried to dismount volumes and to switch the contents of file system artifacts with random information, utilizing one thread per drive and quantity for every recognized path. Focused artifacts embody MBR, $MFT, $MFTMirr, $LogFile, $Boot, $Bitmap, $TxfLog, $Tops, and $AttrDef.

Among the 2022 wiper assaults towards Ukraine had been attributed to Cadet Blizzard, an APT working on behalf of GRU. Final 12 months, the US introduced prices towards a member of the group.

Associated: Kapeka: A New Backdoor in Sandworm’s Arsenal of Aggression

Associated: Andrei Tarasov: Contained in the Journey of a Russian Hacker on the FBI’s Most Needed Checklist

Associated: Recorded Future Tagged as ‘Undesirable’ in Russia

Associated: Google Particulars Latest Ukraine Cyberattacks

Security Week News Tags:Critical, Destructive, Infrastructure, PathWiper, Targeting, Ukraines

Post navigation

Previous Post: Cisco Patches Critical ISE Vulnerability With Public PoC
Next Post: HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Related Posts

Motors Theme Vulnerability Exploited to Hack WordPress Websites Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News
Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Security Week News
Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears Security Week News
Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News
Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark