HermeticWiper: What do we need to know about this new malware?

– Sruthi Sivaraman

As the geopolitical tensions increase between Russia and Ukraine day by day, new malware is targeted against the Ukrainian infrastructure and its government departments. This was first deployed by two research agencies Symantec and ESET on 23rd February and named the new strain as HermeticWiper which is analogous to Whispergate and NotPetya. But the primitive know sample of the malware dates back to 2021. The escalating situation between the two countries has led to cyberwarfare, including a new variant of destructive malware that renders infected systems inoperable.

The malware features a legalized code-signing certificate issued in April 2021 to Hermetica Digital Ltd. In consequence, the name HermeticWiper was coined by SentinelOne principal threat researcher Juan Andrés Guerrero-Saade. This company doesn’t even have a website, however, so it’s possible it has been found just to induce that one certificate, which grants the malware access to parts of Windows that are out of reach for unsigned software.

HermeticWiper could pose a great threat not only to the organizations but also to other countries’ safety. Here’s what it could do to your computer. When it is deployed to the trageted device, it abuses legitimate drivers from the EaseUS Partition Master software in order to corrupt data, with particular emphasis on the Master Boot Record says a researcher at ESET.  The wiper damages Master Boot Record (MBR) and bricks the infected system. Later, HermeticWiper drops a ransom note. The ransome note should never be trusted because it is impossible to recover data after the MBR is damaged. Recuperating from such an attack requires a new operating system.

Guerrero-Saade said in a SentinelOne analysis that the malware checks for all physical drives connected to a system, corrupts the Master Boot Record, proceeds to enumerate the partitions for all possible drives, then corrupts those partitions employing a “bit fiddler” function. Wiper attacks predominantly have 3 techniques: targeting the files, system and data backups, and lastly the system boot of an operating system. Among these, file destruction takes a longer time to accomplish. To avoid misspend of time, majority wipers don’t overwrite disk drives completely and instead write minuscule amounts of data randomly at specific intervals to destroy the files.

The wiper holds high privileges on the compromised host to make the host unbootable by overriding the boot records and configurations, erasing device configurations, and deleting shadow copies (backups). It turns out that the wiper is configured to NOT encrypt domain controllers. This permits the domain to keep running, enabling the wiper software to utilize valid credentials to authenticate to servers and encrypt those. This accentuates the critical role of identity in these attacks. 

So what’s the way out? It’s okay to update your profile picture on Instagram but make sure to update your malware protection first. Having a backup partner could be totally fine but taking a robust backup of your data can recover your data even after a major wiper attack. If you’re checking the features of your device before buying it then why not check the security features your Operating System is offering you? Your safety lies in your hands.

One response to “HermeticWiper: What do we need to know about this new malware?”

  1. It was in interesting read but it was too technical and very long i lost interest half way through. This will only attract attention of people who are deeply interested in the topic as half the terms made Little to no sense to me. So if you want to attract a bigger demography you need to make this shorter and less technical and don’t just state certain facts as if the reader is supposed to know those no body likes that otherwise the site is good but i m not accepting the cookies hope you understand

    Liked by 1 person

Leave a comment

Design a site like this with WordPress.com
Get started