Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

Posted on June 6, 2025June 6, 2025 By CWS

Russian menace actors are as soon as once more focusing on Ukraine’s vital infrastructure with damaging malware, a recent report from Cisco Talos reveals.

Wiper assaults towards Ukraine had been executed in January and February 2022, in coordination with Russia’s assault on the nation, with malware similar to WhisperGate, HermeticWiper, IsaacWiper and CaddyWiper recognized and analyzed. In April, Industroyer2 was used towards industrial management methods (ICS).

As Russia intensified its actions in our on-line world, the assaults continued and Ukraine’s largest cell community operator, Kyivstar, had its IT infrastructure partially destroyed in a December 2023 cyberattack.

Now, Talos says a vital infrastructure entity inside Ukraine fell sufferer to a damaging assault through which new malware, dubbed PathWiper, was used.

The brand new malware shares similarities with HermeticWiper, which has been attributed to Sandworm, additionally tracked as Seashell Blizzard, APT44, Iridium, TeleBots, and Voodoo Bear, an APT group related to GRU, Russia’s army intelligence.

Each wipers, Talos explains, goal the grasp boot document (MBR) and NTFS-related artifacts for corruption, albeit the mechanisms differ. PathWiper seeks all linked drives and volumes, identifies quantity labels, and paperwork legitimate information, whereas HermeticWiper merely enumerates bodily drives from 0 to 100.

As a part of the PathWiper assault, a legit endpoint administration framework was used to execute malicious instructions and deploy the wiper. The attackers used filenames and actions mimicking these of the utility’s console.

“Any instructions issued by the executive device’s console had been acquired by its shopper operating on the endpoints. The shopper then executed the command as a batch (BAT) file, with the command line partially resembling that of Impacket command executions, although such instructions don’t essentially point out the presence of Impacket in an setting,” Talos explains.Commercial. Scroll to proceed studying.

When executed, PathWiper tried to dismount volumes and to switch the contents of file system artifacts with random information, utilizing one thread per drive and quantity for every recognized path. Focused artifacts embody MBR, $MFT, $MFTMirr, $LogFile, $Boot, $Bitmap, $TxfLog, $Tops, and $AttrDef.

Among the 2022 wiper assaults towards Ukraine had been attributed to Cadet Blizzard, an APT working on behalf of GRU. Final 12 months, the US introduced prices towards a member of the group.

Associated: Kapeka: A New Backdoor in Sandworm’s Arsenal of Aggression

Associated: Andrei Tarasov: Contained in the Journey of a Russian Hacker on the FBI’s Most Needed Checklist

Associated: Recorded Future Tagged as ‘Undesirable’ in Russia

Associated: Google Particulars Latest Ukraine Cyberattacks

Security Week News Tags:Critical, Destructive, Infrastructure, PathWiper, Targeting, Ukraines

Post navigation

Previous Post: Cisco Patches Critical ISE Vulnerability With Public PoC
Next Post: HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Related Posts

ConnectWise Discloses Suspected State-Sponsored Hack Security Week News
Google Researchers Find New Chrome Zero-Day Security Week News
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
Over 30 Vulnerabilities Patched in Android Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Companies Warned of Commvault Vulnerability Exploitation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News