Article Details
Scrape Timestamp (UTC): 2025-06-06 14:43:15.911
Original Article Text
Click to Toggle View
New PathWiper data wiper malware hits critical infrastructure in Ukraine. A new data wiper malware named 'PathWiper' is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country. The payload was deployed through a legitimate endpoint administration tool, indicating that attackers had achieved administrative access to the system through a prior compromise. Cisco Talos researchers who discovered the attack attributed it with high confidence to a Russia-linked advanced persistent threat (APT). The researchers compare PathWiper to HermeticWiper, previously deployed in Ukraine by the 'Sandworm' threat group, which had similar functionality. Hence, PathWiper may be an evolution of HermeticWiper, used in attacks by the same or overlapping threat clusters. PathWiper's destructive capabilities PathWiper executes on target systems via a Windows batch file that launches a malicious VBScript (uacinstall.vbs), that in turn drops and executes the primary payload (sha256sum.exe) [VirusTotal]. The execution mimics the behavior and names associated with a legitimate admin tool to evade detection. Instead of simply enumerating physical drives like HermeticWiper, PathWiper programmatically identifies all connected drives (local, network, dismounted) on the system. Next, it abuses Windows APIs to dismount volumes to prepare them for corruption and then creates threads for each volume to overwrite critical NTFS structures. Among the targeted system files in the root directory of the NTFS are: PathWiper overwrites the above and another five critical NTFS files with random bytes, rendering impacted systems completely inoperable. The observed attacks do not involve extortion or any form of financial demands, so their sole aim is destruction and operational disruption. Cisco Talos published file hashes and snort rules to help detect the threat and stop it before it corrupts the drives. Data wipers have become a powerful tool in attacks on Ukraine since the war began, with Russian threat actors commonly using them to disrupt critical operations in the country. This includes wipers named DoubleZero, CaddyWiper, HermeticWiper, IsaacWiper, WhisperKill, WhisperGate, and AcidRain. Why IT teams are ditching manual patch management Manual patching is outdated. It's slow, error-prone, and tough to scale. Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.
Daily Brief Summary
A newly identified data wiper malware, "PathWiper," targets critical infrastructure in Ukraine, aiming to disrupt operations.
Cisco Talos researchers attribute the malware with high confidence to a Russia-linked advanced persistent threat (APT) group, relating it to previous similar attacks.
PathWiper is executed through a Windows batch file and uses a VBScript to deploy the primary malware payload, designed to mimic legitimate administrative tools to avoid detection.
The malware targets both local and network drives, dismounting volumes and overwriting crucial NTFS structures, rendering affected systems inoperable.
Unlike other wiper attacks, PathWiper does not involve financial extortion; its primary goal is operational disruption.
Cisco Talos has released file hashes and snort rules to help detect and mitigate the impact of PathWiper in compromised systems.
Data wiper attacks have increased against Ukraine since the start of the conflict with Russia, with various named wipers including DoubleZero and HermeticWiper being deployed.