Tag: ukraine
-
Russia-linked PathWiper malware hits Ukrainian infrastructure
Tags: apt, attack, backup, cisco, ciso, compliance, control, cyber, detection, endpoint, finance, fortinet, infrastructure, insurance, intelligence, malware, network, PurpleTeam, resilience, risk, russia, tactics, threat, tool, ukraine, vulnerability, zero-trustEchoes of past attacks: While PathWiper shares tactical similarities with HermeticWiper, its enhanced capabilities reveal a clear evolution in wiper malware sophistication. The new variant employs advanced techniques, such as querying registry keys to locate network drives and dismounting volumes to bypass protections, a stark contrast to HermeticWiper’s simpler approach of sequentially targeting drives numbered…
-
Ukraine’s critical infrastructure subjected to novel PathWiper compromise
First seen on scworld.com Jump to article: www.scworld.com/brief/ukraines-critical-infrastructure-subjected-to-novel-pathwiper-compromise
-
New Wiper Malware Targets Ukrainian Infrastructure
New PathWiper malware targeted Ukrainian critical infrastructure, using legitimate tools for cyber-attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/pathwiper-malware-targets-ukraine/
-
New PathWiper Malware Strikes Ukraine’s Critical Infrastructure
Cisco Talos discovers PathWiper, a destructive new malware targeting critical infrastructure in Ukraine, highlighting ongoing cyber threats amidst the Russia-Ukraine conflict. First seen on hackread.com Jump to article: hackread.com/pathwiper-malware-hit-ukraines-critical-infrastructure/
-
Russia-linked threat actors targets Ukraine with PathWiper wiper
A Russia-linked threat actor targeted a critical infrastructure organization in Ukraine with a new destructive malware dubbed PathWiper. Russia-linked threat actor targeted Ukraine’s critical infrastructure with a new wiper named PathWiper. Cisco Talos researchers reported that attackers utilized a legitimate endpoint administration tool, indicating they had access to the administrative console, then used it to…
-
Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
Destructive malware has been a hallmark of Putin’s multi-modal war First seen on theregister.com Jump to article: www.theregister.com/2025/06/06/pro_russia_wiper_ukraine/
-
New PathWiper data wiper malware hits critical infrastructure in Ukraine
A new data wiper malware named ‘PathWiper’ is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-pathwiper-data-wiper-malware-hits-critical-infrastructure-in-ukraine/
-
Another data wiper found in Ukrainian critical infrastructure
The new PathWiper, spotted in an attack on Ukrainian critical infrastructure, has similarities to wiper malware previously deployed by the Russian group known as Sandworm. First seen on therecord.media Jump to article: therecord.media/pathwiper-malware-critical-infrastructure-ukraine
-
New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack
A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos.”The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper…
-
New pathWiper Malware Targets Critical Infrastructure to Deploy Admin Tools
Cisco Talos has uncovered a sophisticated and destructive cyberattack targeting a critical infrastructure entity in Ukraine, deploying a previously unknown wiper malware dubbed >>PathWiper.
-
‘PathWiper’ Attack Hits Critical Infrastructure In Ukraine
Cisco Talos researchers observed the new wiper malware in a destructive attack against an unnamed critical infrastructure organization. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/pathwiper-attack-critical-infrastructure-ukraine
-
Russian aerospace firm breach claimed by Ukraine
First seen on scworld.com Jump to article: www.scworld.com/brief/russian-aerospace-firm-breach-claimed-by-ukraine
-
Breach Roundup: Ukraine Hacks Russian Warplane Maker
Also, Crypter Takedown, Threat Intel Naming Accord and Regulators Ping CrowdStrike. This week, Ukraine hacked Tupelov, Russian hacking, crypter sites seized and the U.S. will seize North Korean IT worker crypto. Regulators probed CrowdStrike. A Rosetta Stone for intel. A Romanian man admitted to swatting, Lee Enterprises hack exposed data and an FBI vet joined…
-
Ukrainian police arrest hacker who used hosting firm’s servers to mine cryptocurrency
The suspect, a native of the central Ukrainian city of Poltava, had been conducting cyberattacks since at least 2018, police said. First seen on therecord.media Jump to article: therecord.media/ukrainian-police-arrest-hacker-cryptomining
-
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper.” First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/pathwiper-targets-ukraine/
-
PathWiper: Russia-Linked APT Deploys New Wiper Malware Against Ukrainian Infrastructure
The post PathWiper: Russia-Linked APT Deploys New Wiper Malware Against Ukrainian Infrastructure appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/pathwiper-russia-linked-apt-deploys-new-wiper-malware-against-ukrainian-infrastructure/
-
Geheime Daten erbeutet: Ukraine will russischen Bomber-Hersteller gehackt haben
Bei einem Cyberangriff auf den russischen Flugzeugbauer Tupolev sind wohl geheime Daten in die Hände des ukrainischen Militärgeheimdienstes gelangt. First seen on golem.de Jump to article: www.golem.de/news/geheime-daten-erbeutet-ukraine-will-russischen-bomber-hersteller-gehackt-haben-2506-196863.html
-
Ukraine strikes Russian bomber-maker with hack attack
Drones are not enough First seen on theregister.com Jump to article: www.theregister.com/2025/06/04/ukraine_hack_attack_russia/
-
Ukraine’s military intelligence agency stole 4.4GB of highly classified internal data from Tupolev
Ukraine’s GUR hacked the Russian aerospace and defense company Tupolev, stealing 4.4GB of highly classified internal data. Ukraine’s military intelligence agency GUR (aka HUR) claims the hack of the Russian aerospace and defense company Tupolev. According to Kyiv Post, Ukraine’s Military Intelligence compromised the United Aircraft Company (UAC) Tupolev division, which is a key developer…
-
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
The Ukrainian police arrested a 35-year-old hacker who breached 5,000 accounts at an international hosting company and used them to mine cryptocurrency, resulting in $4.5 million in damages. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-arrested-for-breaching-5-000-hosting-accounts-to-mine-crypto/
-
Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker
The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev, which develops Russia’s supersonic strategic bombers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/
-
Ukraine’s military intelligence claims cyberattack on Russian strategic bomber maker
Ukraine said it hacked into the internal systems of Russia’s state-owned aircraft manufacturer Tupolev, days after Ukraine launched a drone offensive that damaged planes made by company. First seen on therecord.media Jump to article: therecord.media/ukraine-military-russia-strategic-bomber
-
The Ramifications of Ukraine’s Drone Attack
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the Ukrainians could sneak drones so close to major air bases in a police state such as Russia, what is to prevent the Chinese from doing the same with U.S. air bases? Or the Pakistanis with…
-
Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody Hyena, has emerged as a formidable threat to Russian organizations in 2025. This group, which publicly declared its intentions via a Telegram channel in early 2024, has been implicated in a series of devastating cyberattacks…
-
#Infosec2025: Good Cybersecurity Enabled Ukraine’s Surprise Attack on Russia, Says NCSC
Effective cybersecurity played a key role Ukraine drone attack on Russian strategic bombers, a leading government security expert has claimed First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/infosec2025-ukraine-drone-attack/
-
#Infosec2025: Good Cybersecurity Enabled Ukraine’s Surprise Attack on Russia, Says NCSC
Effective cybersecurity played a key role Ukraine drone attack on Russian strategic bombers, a leading government security expert has claimed First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/infosec2025-ukraine-drone-attack/
-
Ukrainians smuggle drones hidden in cabins on trucks to strike Russian airfields
A real-world Trojan Horse attack First seen on theregister.com Jump to article: www.theregister.com/2025/06/02/ukrainian_drones_russia_bombing/
-
Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says
BO Team, also known as Black Owl, has been active since early 2024 and appears to operate independently, with its own arsenal of tools and tactics, researchers at Russian cybersecurity firm Kaspersky said. First seen on therecord.media Jump to article: therecord.media/pro-ukraine-hacker-group-black-owl-major-threat-russia
-
BKA enthüllt Identität von Trickbot-Anführer
Tags: cybercrime, germany, hacker, infrastructure, intelligence, international, leak, malware, ransomware, tool, ukraine, usaInternational gesucht: Hacker-Boss soll sich in Russland verstecken Hinweise erbeten.Der Anführer der berüchtigten russischen Cybercrime-Gruppe Trickbot, die seit mindestens 2016 weltweit massive Schäden anrichtet, wurde enttarnt: Vitalii Nikolaevich Kovalev, auch bekannt unter dem Pseudonym ‘Stern”, soll der Kopf der Bande sein, die auch unter dem Namen Wizard Spider bekannt ist.Verantwortlich für die Enthüllung ist das…

