Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
As the war between Russia and Ukraine continues, CaddyWiper and RURansom take center stage in cyber space. CaddyWiper, a data wiping malware, is targeting Ukrainian networks; while RURansom, which is also a wiper despite its name, is targeting Russian networks. Neither wiper has been associated with previous wiper malware attacks which include WhisperGate, HermeticWiper, and IsaacWiper.
Ukraine has not been the only one on the receiving end of wiper attacks. On March 1, 2022, the Malware Hunter Team published a tweet about a malware variant named RURansom. The malware is a .NET-based wiper and is targeting entities in Russia. RURansom encrypts files on their victim’s computers and spreads like a worm within the network or through USB devices. It then leaves a wiper note in the victim’s machine. Because RURansom causes irreversible destruction of encrypted files, it can’t be called ransomware. The note that is left behind is more of a declaration than a ransomware note. Also, ransomware infections demand a ransom for decryption keys but RURansom’s keys are random and aren’t stored anywhere.
Wiper Note Left by RURansom
Source: Trendmicro.com
According to researchers from Cyble, the malware is hard coded to only affect computers with Russian IP addresses. RURansom is written in .NET programming language and spreads by copying itself under the following file name: Россия-Украина_Война-Обновление.doc.exe. This file name translates to “Russia-Ukraine_War-Update.doc.exe” in English. After RURansom successfully spreads, it starts encryption.
Trend Micro reported that there are several versions of RURansom. Some of the versions stop execution if the software is launched outside of Russia. This shows that the threat actors make an effort to specifically target Russian-based machines.
CaddyWiper, the third wiper discovered by ESET, was observed on March 14, 2022 – just a couple of weeks after RURansom was discovered. CaddyWiper was compiled just two hours before its deployment and has targeted a few dozen systems within the governmental and financial sectors in Ukraine. Although CaddyWiper’s code is not similar to HermeticWiper or IsaacWiper, the goal is still the same – erase user data and partition information from attached drives to render systems unusable.
According to a series of tweets published by ESET Research, CaddyWiper’s operators had control of their target’s network before they deployed the malware via Microsoft Group Policy Objects (GPO). ESET Research also observed that one organization’s default GPO was abused to spread malware infections. They further reported that CaddyWiper avoids erasing data on domain controllers – a tactic they more than likely use to keep access inside the organization while continuing to disturb operations.
CaddyWiper malware was designed to erase data across Windows domains, using the DsRoleGetPrimaryDomainInformation() function to confirm if a device is a domain controller. If the device is a domain controller, then the data will not be deleted.
Unlike ransomware, the goal of deploying a wiper is not financial, its sole purpose is to destroy everything it can. With the ongoing war between Russia and Ukraine, cyber criminals will take opportunities like these to capitalize on the conflict. If there is a chance for a potential victim to install their payload, they will take it. Although these destructive attacks are specific to Ukraine and Russia, any organization can end up being caught in the crossfire. Avertium encourages all businesses great and small to secure their environments. CISA has issued a “Shields Up” public service announcement to help keep your organization prepared.
CISA’s recommendations apply for RURansom CaddyWiper:
RURansom
CaddyWiper
CaddyWiper: More destructive wiper malware strikes Ukraine | ZDNet
AlienVault - Open Threat Exchange
New CaddyWiper data wiping malware hits Ukrainian networks (bleepingcomputer.com)
Cyble — New Wiper Malware Attacking Russia: Deep-dive into RURansom Malware
New RURansom Wiper Targets Russia (trendmicro.com)
Related Reading:
HermeticWizard, HermeticRansom, and IsaacWiper Target Ukraine
Contact us for more information about Avertium’s managed security service capabilities.