Tech retailers in Ukraine were attacked by the SwiftSlicer virus – it is linked to the Sandworm hacker group, which works for Russia

Tech retailers in Ukraine were attacked by the SwiftSlicer virus - it is linked to the Sandworm hacker group, which works for Russia

Security researchers from ESET have discovered a new virus called SwiftSlicer, which was used in recent attacks against targets in Ukraine. SwiftSlicer targets critical Windows operating system files and Active Directory (AD) databases. The virus destroys operating system resources and disables Windows domains.

We help

Unrecognizable

Researchers have identified the SwiftSlicer malware in a cyberattack on Ukrainian technology stores. The malware was written using a cross-platform language called Golang, better known as Go, and attacks Active Directory group policies.

Eset’s announcement states that the malware is identified as WinGo/Killfiles.C. When executed, SwiftSlicer deletes shadow copies and recursively overwrites files, then restarts the computer. The virus overwrites data using blocks of 4096 bytes long, consisting of randomly generated bytes. Overwritten files are usually located in the path %CSIDL_SYSTEM%\drivers, %CSIDL_SYSTEM_DRIVE%\Windows\NTDS and some other non-system resources.

Course

FINANCIAL MANAGER

Become a professional financial manager and earn from $500 in 2 months.

REGISTER!finmanager

Analysts have linked the Wiper-type malware to the Sandworm hacking group, which serves the General Intelligence Directorate of the General Staff (GU GSH) and the Main Center for Special Technologies (CGST). The latest attack echoes the recent HermeticWiper and CaddyWiper outbreaks that occurred during the Russian invasion. The specifics of the program’s deployment lead ESET to believe that Sandworm may have gained control of targets’ Active Directory environments before the attack began.

The Ukrainian Computer Emergency Response Team (CERT-UA) recently discovered another combination of several malicious data deletion packages deployed on the networks of the Ukrinform news agency. The malicious scripts targeted Windows, Linux, and FreeBSD and infected them with several viruses, including CaddyWiper, ZeroWipe, SDelete, AwfulShred, and BidSwipe.

According to CERT-UA, the attacks were only partially successful. One of Sandworm’s malicious packages, CaddyWiper, was also discovered in a failed attack on one of Ukraine’s largest electricity suppliers in April 2022. ESET researchers helped Ukraine repel this attack by working with CERT-UA to restore and protect the network.

“Cyber ​​criminals have mentioned the topic of COVID-19”. The State Intelligence Service warns about the distribution of e-mails with malicious programs

Source: TechSpot

Related Posts

The Qualcomm Snapdragon X Plus processor “lit up” in Geekbench 6 with the Microsoft Surface Pro 10 laptop

The Technology section is powered by Favbet Tech The Snapdragon X Elite processor will not be the only one in Qualcomm’s new line for computers. One such…

New trailer for the movie “Deadpool and Wolverine” – Hugh Jackman shows “claws” to Ryan Reynolds

The first R-rated Marvel film opens in the Ukrainian box office on July 25. After a short teaser that only showed us a shadow of Wolverine, Ryan…

Google disowned contractors and canceled their minimum wage and bonuses

Google on Friday canceled minimum wage, health insurance and other benefits for its contractors and staffing companies. Before that, workers received at least $15 an hour, Reuters…

Copilot in Microsoft 365 will soon “speak” in Ukrainian

In a recent interview, the director of Microsoft Ukraine, Leonid Polupan, talked about some features of the company’s work and new products. For example, he said that…

Deliverance II – and revealed the details of the gameplay

In an interview with the Czech resource Indian, the lead designer of the game Kingdom Come: Deliverance II from Warhorse, Prokop Jirsa, shared the details of the…

Apple has ordered capacitive button components, likely for the iPhone 16 or iPhone 17

According to knowledgeable sources in Asia, Apple has ordered a large number of capacitive component buttons from a supplier in Taiwan. These components are allegedly intended for…

Leave a Reply

Your email address will not be published. Required fields are marked *