![]() ![]() ![]() The use of CaddyWiper, which was first discovered by ESET in March when it was deployed in the network of a Ukrainian bank, was designed to erase traces of Industroyer2. The researchers added that Sandworm used several other destructive malware in coordination with Industroyer2, including CaddyWiper, ORCSHRED, SOLOSHRED and AWFULSHRED. The scheduled execution of the malware was April 8 2022. In the latest incident, ESET claimed that Sandworm, which is linked to the Russian state security services, attempted to deploy the new version of Industroyer against high-voltage electrical substations in Ukraine, with the purpose of triggering power outages. The Industroyer malware was believed to have been used by the Sandworm APT group to cut power in Kiev, Ukraine, back in 2016. The discovery was made by researchers from cybersecurity vendor ESET in collaboration with the Ukrainian Computer Emergency Response Team (CERT-UA). A Ukrainian energy supplier was targeted by a new variant of Industroyer malware named Industroyer2.
0 Comments
Leave a Reply. |