Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

Posted on February 2, 2026February 2, 2026 By CWS

A harmful new data-wiping malware generally known as DynoWiper has emerged, focusing on vitality firms in Poland with harmful assaults designed to completely erase vital knowledge.

The malware surfaced in December 2025 when safety researchers detected its deployment at a Polish vitality agency.

In contrast to typical ransomware that encrypts recordsdata for financial acquire, DynoWiper operates with a single harmful function: to overwrite and destroy knowledge throughout compromised networks, rendering methods fully unbootable.

The assault represents a regarding escalation in cyber threats towards vital infrastructure.

DynoWiper was deployed by a number of variants, together with recordsdata named schtask.exe, schtask2.exe, and an replace executable, all launched on December 29, 2025.

The attackers made a number of makes an attempt to execute the malware after preliminary failures, modifying the code every time to bypass safety defenses.

Nevertheless, the put in endpoint detection and response product efficiently blocked execution, considerably limiting the injury.

Welivesecurity analysts recognized putting similarities between DynoWiper and a beforehand recognized wiper referred to as ZOV, which was used towards Ukrainian targets earlier.

The analysis group attributed DynoWiper to Sandworm, a Russia-aligned risk group infamous for conducting harmful cyberattacks towards vitality firms.

Wallpaper dropped by the ZOV wiper (Supply – Welivesecurity)

Sandworm, generally linked to Unit 74455 of the Russian Principal Intelligence Directorate (GRU), has an extended historical past of focusing on vital infrastructure throughout Jap Europe.

The malware operates by a calculated three-phase destruction course of. In the course of the first section, DynoWiper recursively searches for recordsdata on all fastened and detachable drives whereas excluding sure system directories to take care of momentary system performance.

The wiper makes use of a 16-byte buffer containing random knowledge to overwrite file contents. Information smaller than 16 bytes are fully overwritten, whereas bigger recordsdata have parts of their contents destroyed to hurry up the destruction course of.

Deployment By means of Energetic Listing Exploitation

DynoWiper’s an infection mechanism demonstrates refined community penetration capabilities. The attackers exploited Energetic Listing Group Coverage to distribute the malware throughout the compromised community.

This deployment technique requires Area Admin privileges, highlighting the risk group’s capability to achieve high-level entry to focused organizations.

The malware was positioned in a shared community listing, permitting execution throughout a number of machines concurrently.

Previous to deploying the wiper, attackers used credential-stealing instruments like Rubeus and tried to dump the LSASS course of reminiscence utilizing Home windows Process Supervisor. In addition they deployed a SOCKS5 proxy instrument referred to as rsocx to determine reverse connections with exterior servers.

This multi-stage strategy demonstrates cautious planning and reconnaissance earlier than launching the ultimate harmful payload.

Organizations within the vitality sector ought to implement strict entry controls, community segmentation, and steady monitoring to detect such refined intrusion makes an attempt earlier than wipers will be deployed.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Companies, Data, DataWiping, Destroy, DynoWiper, Energy, Malware

Post navigation

Previous Post: 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
Next Post: Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Related Posts

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News
EY’s 4TB SQL Server Backup File On Microsoft Azure Exposed Publically EY’s 4TB SQL Server Backup File On Microsoft Azure Exposed Publically Cyber Security News
WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File Cyber Security News
VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests) VirtualBox 7.2.2 Released With Fix For GUI Crashes On Virtual Machines (guests) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark