Security

'Hundreds of computers' in Ukraine hit with wiper malware as conflict continues

Of course you realize, this means war


Hundreds of computers in Ukraine have been infected with data-wiping Windows malware, say researchers at ESET.

In a series of tweets on Wednesday, the infosec biz said it picked up its first sample of the software nasty at about 1500 UTC, and believes the code has been in the works for the past two months.

"ESET telemetry shows that it was installed on hundreds of machines in the country," the biz stated.

We're told the data wiper is cryptographically signed with a legit, and presumably fraudulently obtained, developer certificate to persuade antivirus tools and users to trust it. The malware uses drivers from a partitioning program to corrupt storage devices and destroy files on infected systems, according to ESET.

It's not entirely clear right now how the malware is dropped onto victims' machines and run, though in one case, said ESET, an organization's Active Directory server was probably compromised to distribute the wiper through the network via a group policy object.

Symantec's threat intelligence wing also said it had spotted data-trashing malware in Ukraine; the Broadcom-owned biz added it had seen infections in Latvia and Lithuania also.

ESET dubbed the nasty Win32/KillDisk.NCV. It's understood the code not only wipes files from the drive, it also nukes the MBR, making booting and recovery difficult or impossible thereafter.

This comes as various Ukrainian websites were disrupted to varying degrees by denial-of-service attacks, and Britain's National Cyber Security Centre warned of a new Kremlin-linked strain of malware that is separate to the wiper ESET and Symantec uncovered.

And the wider context of this is Russia this week invading an area of eastern Ukraine, ostensibly on a peacekeeping mission to protect two separatist regions of Ukraine. That move triggered fresh US sanctions against Moscow.

Uncle Sam has warned American businesses and organizations to prepare for cyber-attacks from Russia in retaliation for these sanctions and the White House's opposition to Russian President Vladimir Putin's intrusion into Ukraine.

It is feared a full invasion will now follow, as Russia has been amassing troops near Ukraine's border. Ukraine's websites and systems have been targeted and disrupted by miscreants for the past few weeks amid a build up in tensions and breakdown in diplomacy.

A spokesperson for the Consulate General of Ukraine in San Francisco was not available for immediate comment. The entire web presence of the nation's Ministry of Foreign Affairs is offline from a cyber-attack, it appears, we note. ®

Send us news
116 Comments

Germany cuffs alleged Russian spies over plot to bomb industrial and military targets

Apparently an attempt to damage Ukraine's war effort

US House approves FISA renewal – warrantless surveillance and all

PLUS: Chinese chipmaker Nexperia attacked; A Microsoft-signed backdoor; CISA starts scanning your malware; and more

Kremlin's Sandworm blamed for cyberattacks on US, European water utilities

Water tank overflowed during one system malfunction, says Mandiant

Old Windows print spooler bug is latest target of Russia's Fancy Bear gang

Putin's pals use 'GooseEgg' malware to launch attacks you can defeat with patches or deletion

Head of Israeli cyber spy unit exposed ... by his own privacy mistake

Plus: Another local government hobbled by ransomware; Huge rise in infostealing malware; and critical vulns

US sanctions spree continues with 15 more for Russian entities

Financial firms that help evade existing restrictions in crosshairs

Is Russia using Starlink in Ukraine? Congress demands answers

And saying Starlink doesn't work inside Russian borders isn't sufficient...

Microsoft confirms memory leak in March Windows Server security update

ALSO: Viasat hack wiper malware is back, users are the number one cause of data loss, and critical vulns

Russia's Cozy Bear caught phishing German politicos with phony dinner invites

Forget the Riesling, bring on the WINELOADER

It's 2024 and North Korea's Kimsuky gang is exploiting Windows Help files

New infostealer may indicate a shift in tactics – and maybe targets too, beyond Asia

ChatGPT side-channel attack has easy fix: Token obfuscation

Also: Roblox-themed infostealer on the prowl, telco insider pleads guilty to swapping SIMs, and some crit vulns

Kremlin accuses America of plotting cyberattack on Russian voting systems

Don't worry, we have a strong suspicion Putin's still gonna win