Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

Posted on June 6, 2025June 6, 2025 By CWS

Russian menace actors are as soon as once more focusing on Ukraine’s vital infrastructure with damaging malware, a recent report from Cisco Talos reveals.

Wiper assaults towards Ukraine had been executed in January and February 2022, in coordination with Russia’s assault on the nation, with malware similar to WhisperGate, HermeticWiper, IsaacWiper and CaddyWiper recognized and analyzed. In April, Industroyer2 was used towards industrial management methods (ICS).

As Russia intensified its actions in our on-line world, the assaults continued and Ukraine’s largest cell community operator, Kyivstar, had its IT infrastructure partially destroyed in a December 2023 cyberattack.

Now, Talos says a vital infrastructure entity inside Ukraine fell sufferer to a damaging assault through which new malware, dubbed PathWiper, was used.

The brand new malware shares similarities with HermeticWiper, which has been attributed to Sandworm, additionally tracked as Seashell Blizzard, APT44, Iridium, TeleBots, and Voodoo Bear, an APT group related to GRU, Russia’s army intelligence.

Each wipers, Talos explains, goal the grasp boot document (MBR) and NTFS-related artifacts for corruption, albeit the mechanisms differ. PathWiper seeks all linked drives and volumes, identifies quantity labels, and paperwork legitimate information, whereas HermeticWiper merely enumerates bodily drives from 0 to 100.

As a part of the PathWiper assault, a legit endpoint administration framework was used to execute malicious instructions and deploy the wiper. The attackers used filenames and actions mimicking these of the utility’s console.

“Any instructions issued by the executive device’s console had been acquired by its shopper operating on the endpoints. The shopper then executed the command as a batch (BAT) file, with the command line partially resembling that of Impacket command executions, although such instructions don’t essentially point out the presence of Impacket in an setting,” Talos explains.Commercial. Scroll to proceed studying.

When executed, PathWiper tried to dismount volumes and to switch the contents of file system artifacts with random information, utilizing one thread per drive and quantity for every recognized path. Focused artifacts embody MBR, $MFT, $MFTMirr, $LogFile, $Boot, $Bitmap, $TxfLog, $Tops, and $AttrDef.

Among the 2022 wiper assaults towards Ukraine had been attributed to Cadet Blizzard, an APT working on behalf of GRU. Final 12 months, the US introduced prices towards a member of the group.

Associated: Kapeka: A New Backdoor in Sandworm’s Arsenal of Aggression

Associated: Andrei Tarasov: Contained in the Journey of a Russian Hacker on the FBI’s Most Needed Checklist

Associated: Recorded Future Tagged as ‘Undesirable’ in Russia

Associated: Google Particulars Latest Ukraine Cyberattacks

Security Week News Tags:Critical, Destructive, Infrastructure, PathWiper, Targeting, Ukraines

Post navigation

Previous Post: Cisco Patches Critical ISE Vulnerability With Public PoC
Next Post: HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Related Posts

Krispy Kreme Confirms Data Breach After Ransomware Attack Security Week News
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
Russian Qakbot Gang Leader Indicted in US Security Week News
Horizon3.ai Raises $100 Million in Series D Funding Security Week News
Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News