Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

Posted on June 6, 2025June 6, 2025 By CWS

Russian menace actors are as soon as once more focusing on Ukraine’s vital infrastructure with damaging malware, a recent report from Cisco Talos reveals.

Wiper assaults towards Ukraine had been executed in January and February 2022, in coordination with Russia’s assault on the nation, with malware similar to WhisperGate, HermeticWiper, IsaacWiper and CaddyWiper recognized and analyzed. In April, Industroyer2 was used towards industrial management methods (ICS).

As Russia intensified its actions in our on-line world, the assaults continued and Ukraine’s largest cell community operator, Kyivstar, had its IT infrastructure partially destroyed in a December 2023 cyberattack.

Now, Talos says a vital infrastructure entity inside Ukraine fell sufferer to a damaging assault through which new malware, dubbed PathWiper, was used.

The brand new malware shares similarities with HermeticWiper, which has been attributed to Sandworm, additionally tracked as Seashell Blizzard, APT44, Iridium, TeleBots, and Voodoo Bear, an APT group related to GRU, Russia’s army intelligence.

Each wipers, Talos explains, goal the grasp boot document (MBR) and NTFS-related artifacts for corruption, albeit the mechanisms differ. PathWiper seeks all linked drives and volumes, identifies quantity labels, and paperwork legitimate information, whereas HermeticWiper merely enumerates bodily drives from 0 to 100.

As a part of the PathWiper assault, a legit endpoint administration framework was used to execute malicious instructions and deploy the wiper. The attackers used filenames and actions mimicking these of the utility’s console.

“Any instructions issued by the executive device’s console had been acquired by its shopper operating on the endpoints. The shopper then executed the command as a batch (BAT) file, with the command line partially resembling that of Impacket command executions, although such instructions don’t essentially point out the presence of Impacket in an setting,” Talos explains.Commercial. Scroll to proceed studying.

When executed, PathWiper tried to dismount volumes and to switch the contents of file system artifacts with random information, utilizing one thread per drive and quantity for every recognized path. Focused artifacts embody MBR, $MFT, $MFTMirr, $LogFile, $Boot, $Bitmap, $TxfLog, $Tops, and $AttrDef.

Among the 2022 wiper assaults towards Ukraine had been attributed to Cadet Blizzard, an APT working on behalf of GRU. Final 12 months, the US introduced prices towards a member of the group.

Associated: Kapeka: A New Backdoor in Sandworm’s Arsenal of Aggression

Associated: Andrei Tarasov: Contained in the Journey of a Russian Hacker on the FBI’s Most Needed Checklist

Associated: Recorded Future Tagged as ‘Undesirable’ in Russia

Associated: Google Particulars Latest Ukraine Cyberattacks

Security Week News Tags:Critical, Destructive, Infrastructure, PathWiper, Targeting, Ukraines

Post navigation

Previous Post: Cisco Patches Critical ISE Vulnerability With Public PoC
Next Post: HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Related Posts

Valuable Information Leaked in LockBit Ransomware Hack  Security Week News
Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
35,000 Solar Power Systems Exposed to Internet Security Week News
Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News