A previously unseen wiper malware dubbed “PathWiper” has been detected targeting Ukrainian critical infrastructure, Cisco Talos revealed this week.
The attackers leveraged a legitimate endpoint administration framework typically used for remote IT support turning it into a devastating weapon to unleash destructive malware across the network.
This operation underscores the advanced capabilities and persistence of Russia nexus APT actors amid ongoing cyber warfare in Eastern Europe.
The attackers’ approach was both strategic and deeply invasive. By compromising the administration console of the victim organization, threat actors gained the ability to centrally dispatch malicious commands to all connected endpoints.
Commands executed via the admin tool’s console were received by client software present on target machines, which then ran the instructions as batch (BAT) files.
The deployment mechanism exhibited similarities to Impacket’s command-line operations, although no direct evidence of Impacket was found.
Key Deployment Chain:
text1. Admin console issues BAT file command to endpoint
2. BAT file executes a dropped malicious VBScript ('uacinstall.vbs'):
C:\WINDOWS\System32\WScript.exe C:\WINDOWS\TEMP\uacinstall.vbs
3. VBScript writes and launches wiper payload ('sha256sum.exe'):
C:\WINDOWS\TEMP\sha256sum.exe
Filenames and execution paths were deliberately crafted to mimic legitimate admin tool activity, suggesting the attackers had intimate knowledge of the software and its deployment processes.
Once launched, PathWiper’s destructive function kicks in with chilling efficiency. It systematically corrupts the file system and storage-related structures by overwriting them with randomly generated data effectively destroying files, metadata, and crucial system records.
Technical Workflow:
HKEY_USERS\Network\<drive_letter>| RemovePath) to identify shared network drives for targeted destruction.Targeted NTFS Artifacts:
Dismount and Overwrite:
FSCTL_DISMOUNT_VOLUME IOCTL (to MountPointManager)Comparison with HermeticWiper:
Detection and Prevention:
Cisco strongly recommends deploying its Secure Endpoint, Email, Firewall, and other security solutions to detect, block, and remediate PathWiper infections:
Snort Detection Rules:
64742, 64743301174text7C792A2B005B240D30A6E22EF98B991744856F9AB55C74DF220F32FE0D00B6B3
The appearance of PathWiper signals a persistent and evolving threat to Ukraine’s digital backbone. Its tailored attack chain, abuse of legitimate admin tools, and destructive payload highlight the critical need for defense-in-depth strategies and continuous monitoring of all privileged access, especially in high-value environments.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…