Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This week, ESET researchers discovered three new cyber attacks against Ukraine: HermeticWizard, HermeticRansom, and IsaacWiper. In our previous Flash Notice, we mentioned the HermeticWiper and how it was being deployed on Ukraine’s computer networks last week. The wiper is similar to WhisperGate and could have been in the works for two months prior to the attack.
Now, there is a new exploit, HermeticWizard, which spreads HermeticWiper (aka DriveSlayer) across local networks via WMI and SMB. HermeticWizard is a worm that was deployed on a Ukrainian system on February 23, 2022. The malware starts by trying to find other machines on a local network before gathering known local IP addresses using these Windows functions:
ESET stated in their report that after HermeticWizard finds a reachable machine, it drops the WMI spreader onto a disk and creates a new process with the following command line: <current folder>\<6 random letters>.ocx #1 -s <path to HermeticWizard> – i <target IP>. According to ESET, like HermeticWiper, HermeticWizard was signed by a code-signing certificate assigned to Hermetica Digital Ltd, which was issued on April 13th, 2021. ESET requested the issuing CA (DigiCert) to revoke the certificate, which it did on February 24th, 2022.
Reuters issued a report stating the Hermetica Digital certificate was stolen by threat actors from Hermetica Digital, which is a Cypriot company. The Hermetica owner from Cyprus didn’t know that his certificate was being used in a malicious malware attack against Ukraine. The owner is a 24-year-old game designer who runs his business from a house next to a Cypriot church on the outskirts of Nicosia – never expecting to wind up in a global crisis. Reuters believes that the attackers impersonated the Cypriot company to get the certificate from DigiCert.
With this new information, ESET believes that the attacked organizations were compromised before HermeticWiper was deployed. HermeticRansom (aka PartyTicket) was also discovered by ESET, which is ransomware written in Go. It’s currently being used at the same time as the HermeticWiper campaign but has a much smaller deployment. ESET believes that the ransomware was deployed at the same time to hide the HermeticWiper’s actions, as it doesn’t use obfuscation mechanisms. This has led researchers to believe that the ransomware was created in a hurry.
In addition to HermeticWizard and HermeticRansom, ESET detected IsaacWiper on February 24, 2022, and it’s suspected that threat actors used tools like Impacket to move laterally within networks and systems. ESET also observed a remote access tool called RemCom being deployed at the same time as IsaacWiper.
Although the attacks come during a time when Russia is at odds with Ukraine, HermeticWizard, HermeticRansom, and IsaacWiper have not been attributed to Russia and the attackers remain unknown. However, IsaacWiper might have been used in previous attacks months prior. There is no known connection between HermeticWiper and IsaacWiper.
Today, Microsoft released a report discussing their discovery of a new malware package called FoxBlade that was directed against Ukraine’s digital infrastructure. However, cyber intelligence researchers discovered that FoxBlade is actually HermeticWiper due to the two exploits having the same file hashes. Also, the same malware was given different names by ESET and Microsoft.
If your organization has ties to Ukraine, you should consider how to isolate and monitor those connections to protect your organization from potential collateral damage.
HermeticWizard:
HermeticRansom (aka PartyTicket) has decryption instructions:
CISA’s recommendations apply for HermeticWiper (aka DriveSlayer), HermeticRansom, and IsaacWiper:
HermeticRansom AKA PartyTicket
HermeticWizard and IsaacWiper
HermeticWiper
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine | WeLiveSecurity
HermeticRansom used as a smokescreen for wiper attacks | Kaspersky official blog
Cyprus games writer denies links to malware found before Russian invasion | Reuters
Related Reading:
[New Malware]: CISA Warns of Renewed Russian Threat as New Activity is Seen in Ukraine
Contact us for more information about Avertium’s managed security service capabilities.