Il commento dei CyberArk Labs in merito all

CyberArk Labs’ comment on the wiper attack on Ukraine

Lavi Lazarovitz, Head of Security Research, CyberArk Labscommented thewiper attack on Ukraine. The wiper malware, called HermeticWiper, was followed by CyberArk Labs who identified specific characteristics of the malware itself. Some elements, in fact, make the malware truly unique. Let’s see the details.

CyberArk Labs comments on the wiper attack on Ukraine

According to Lazarovitz: “Wiper distribution does not appear to exploit supply chain vulnerabilities or other super-spreading techniques.” As a result, the infection, the expert points out, it will not quickly spread to other geographic areas. According to CyberArk, the ransomware distributed using the Active-Director group policy. This means that the attackers had privileged access to AD.

How the malware is configured

Of note, Lazarovitz points out about the wiper attack against Ukraine, which for the malware seems to be configured to: “keep the domain running and allow the ransomware to use valid credentials to authenticate to servers and encrypt them”. This detail confirms that the attackers use compromised identities to be able to access the network and / or to move sideways.

It should be noted that HermeticWiper is also considered a sensitive threat by the Italian Cybersecurity Agency. The attack that hit computer systems in Ukraine also raises concern due to possible further future attacks. The war, as well as on traditional fronts, is now also fought in a cybernetic way.

Walker Ronnie is a tech writer who keeps you informed on the latest developments in the world of technology. With a keen interest in all things tech-related, Walker shares insights and updates on new gadgets, innovative advancements, and digital trends. Stay connected with Walker to stay ahead in the ever-evolving world of technology.