Explained - The Hermetic Wiper Malware That Targeted Ukraine
Explained - The Hermetic Wiper Malware That Targeted Ukraine
Explained - The Hermetic Wiper Malware That Targeted Ukraine
The data-wiper malware, when downloaded, can erase all the data on a device
it targets, in a manner that renders the data irretrievable.
This malware may also access full control of its target’s internal networks,
exposing multiple programs to it. ESET said that in one of the organisations
that the wiper targeted, it was dropped into the system using the default
Group Policy Object (GPO), meaning it could then access the main server to
spread the malware into other devices and programs.
The creation time stamp on the malware said December 28, 2021, indicating
that the attack was being planned for quite some time.
The current wiper malware is also being considered similar to the highly
damaging NotPetya malware attack of 2017, which had affected numerous
businesses in Ukraine and had also spread to other countries. It would also
encrypt a computer’s data in an irrecoverable fashion. It had caused $10
billion in financial damage globally.
Ukraine’s response
Reuters reported that the Ukrainian government is now asking the country’s
underground network of hackers to volunteer in its efforts to defend against
and retaliate to the cyberattacks it is being targeted with.
Besides, after a call for help from Ukraine, the European Union said on
February 22 that it is deploying a cyber rapid-response team (CRRT) across
Europe consisting of cyber experts from six countries — Lithuania, Croatia,
Poland, Estonia, Romania, and the Netherlands — to combat cybersecurity
threats.