This article is more than 1 year old
Ukraine blames Belarus for PC-wiping 'ransomware' that has no recovery method and nukes target boxen
And for last week's digital graffiti operations, too
After last week's website defacements, Ukraine is now being targeted by boot record-wiping malware that looks like ransomware but with one crucial difference: there's no recovery method. Officials have pointed the finger at Belarus.
Targets of this new malware wave "span multiple government, non-profit, and information technology organizations," according to a Microsoft warning issued over the weekend.
The malware itself wipes the target Windows system's master boot record, rendering it inoperable, and its main executable is "often" named stage1.exe, executed by Impacket.
The wiper's second stage, stage2.exe, then rampages through the rest of your system, overwriting everything from Word files to web pages (.HTML and .PHP files), images and databases. It searches for a large list of file extensions and overwrites the file's contents "with a fixed number of 0xCC bytes" totalling 1MB.
Redmond's Threat Intelligence Centre (MSTIC), part of its wider infosec operation, said the wiper was designed to look like ransomware and even drops a ransom note with a Bitcoin wallet address, urging victims to send $10k to it. On top of that, the ransom note also lists a Tox instant messaging address.
Deployed by a group named by Microsoft as DEV-0586, the wiper doesn't have a ransom recovery mechanism despite the above features. MSTIC added that it is "intended to be destructive and designed to render targeted devices inoperable."
So far the wiper is said to have infected "dozens" of systems.
The malware comes after a high-profile website defacement on Friday 14 January that affected a number of Ukrainian government sites. Their usual contents were replaced with notices in Polish, Russian and Ukrainian declaring that personal data had been stolen from the targeted agencies and leaked online; Ukraine later said no such theft had taken place.
- Here's what Russia's SVR spy agency does when it breaks into your network, says US CISA infosec agency
- Russian spies reportedly used SolarWinds hack to steal US counterintelligence details
- Russian cyber-spies changed tactics after the UK and US outed their techniques – so here's a list of those changes
- Mystery traffic redirection attack pulls net traffic through Belarus, Iceland
- Here's 30 servers Russian intelligence uses to fling malware at the West, beams RiskIQ
- Belarus declares war on imaginary country within borders of Belarus that is better than Belarus
- He's not cracked RSA-1024 encryption, he's a very naughty Belarusian ransomware middleman
An unpatched 6.4-rated CVE in October CMS, the government's preferred website content management system, was what let the attackers in.
Who did this? Not Russia but Belarus, says Ukraine
Blame for the hack was laid at the feet of Belarus over the weekend by Ukraine's Serhiy Demedyuk, deputy secretary of the country's national security and defence council.
He told Reuters it was threat group UNC1151, aka info ops group Ghostwriter, saying: "This is a cyber-espionage group affiliated with the special services of the Republic of Belarus… The malicious software used to encrypt some government servers is very similar in its characteristics to that used by the ATP-29 group".
Demedyuk's attribution cites the industry nickname for Russia's SVR spy agency. If Belarus, which recently tightened its political ties with Russia, is carrying out cyber attacks directed by Russia and using Russian tools, this adds another dimension to the simmering conflict in Ukraine. ®