Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

Posted on February 2, 2026February 2, 2026 By CWS

A harmful new data-wiping malware generally known as DynoWiper has emerged, focusing on vitality firms in Poland with harmful assaults designed to completely erase vital knowledge.

The malware surfaced in December 2025 when safety researchers detected its deployment at a Polish vitality agency.

In contrast to typical ransomware that encrypts recordsdata for financial acquire, DynoWiper operates with a single harmful function: to overwrite and destroy knowledge throughout compromised networks, rendering methods fully unbootable.

The assault represents a regarding escalation in cyber threats towards vital infrastructure.

DynoWiper was deployed by a number of variants, together with recordsdata named schtask.exe, schtask2.exe, and an replace executable, all launched on December 29, 2025.

The attackers made a number of makes an attempt to execute the malware after preliminary failures, modifying the code every time to bypass safety defenses.

Nevertheless, the put in endpoint detection and response product efficiently blocked execution, considerably limiting the injury.

Welivesecurity analysts recognized putting similarities between DynoWiper and a beforehand recognized wiper referred to as ZOV, which was used towards Ukrainian targets earlier.

The analysis group attributed DynoWiper to Sandworm, a Russia-aligned risk group infamous for conducting harmful cyberattacks towards vitality firms.

Wallpaper dropped by the ZOV wiper (Supply – Welivesecurity)

Sandworm, generally linked to Unit 74455 of the Russian Principal Intelligence Directorate (GRU), has an extended historical past of focusing on vital infrastructure throughout Jap Europe.

The malware operates by a calculated three-phase destruction course of. In the course of the first section, DynoWiper recursively searches for recordsdata on all fastened and detachable drives whereas excluding sure system directories to take care of momentary system performance.

The wiper makes use of a 16-byte buffer containing random knowledge to overwrite file contents. Information smaller than 16 bytes are fully overwritten, whereas bigger recordsdata have parts of their contents destroyed to hurry up the destruction course of.

Deployment By means of Energetic Listing Exploitation

DynoWiper’s an infection mechanism demonstrates refined community penetration capabilities. The attackers exploited Energetic Listing Group Coverage to distribute the malware throughout the compromised community.

This deployment technique requires Area Admin privileges, highlighting the risk group’s capability to achieve high-level entry to focused organizations.

The malware was positioned in a shared community listing, permitting execution throughout a number of machines concurrently.

Previous to deploying the wiper, attackers used credential-stealing instruments like Rubeus and tried to dump the LSASS course of reminiscence utilizing Home windows Process Supervisor. In addition they deployed a SOCKS5 proxy instrument referred to as rsocx to determine reverse connections with exterior servers.

This multi-stage strategy demonstrates cautious planning and reconnaissance earlier than launching the ultimate harmful payload.

Organizations within the vitality sector ought to implement strict entry controls, community segmentation, and steady monitoring to detect such refined intrusion makes an attempt earlier than wipers will be deployed.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Companies, Data, DataWiping, Destroy, DynoWiper, Energy, Malware

Post navigation

Previous Post: 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
Next Post: Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Related Posts

Hackers Compromise Intelligence Website Used by CIA and Other Agencies Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News
LinkPro Rootkit Attacking GNU/Linux Systems Using eBPF Module to Hide Malicious Activities LinkPro Rootkit Attacking GNU/Linux Systems Using eBPF Module to Hide Malicious Activities Cyber Security News
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection Cyber Security News
TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands Cyber Security News
Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Cyber Security News
Monsta web-based FTP Remote Code Execution Vulnerability Exploited Monsta web-based FTP Remote Code Execution Vulnerability Exploited Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark