HermeticWiper Malware
Destructive malware targeting organizations in Ukraine
Malware known as Hermetic (or, FoxBlade) was found by cybersecurity researchers being used against organizations in Ukraine. Learn More »
Background
Malware actors have deployed destructive malware targetting organizations in Ukraine during the advent of the unprovoked Russian attack against Ukraine. The malware when executed on a Windows PC can wipe the partitions ending up destroying all data and the operating system.
Latest Development
Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.
FortiGuard has Anti-VIrus detection coverage on the malware as W32/KillDisk.NCV!tr. The ANN and behavioural detects the malware as trojan downloader and high risk, respectively.
February 26, CISA announced a destructive malware targetting Ukraine known as HermeticWiper..
FortiGuard Cybersecurity Framework
Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.
-
AV
-
AV (Pre-filter)
-
Behavior Detection
-
ANN
-
Threat Hunting
-
Outbreak Detection
-
Assisted Response Services
-
Automated Response
-
InfoSec Services
-
Attack Surface Monitoring (Inside & Outside)
AV (Pre-filter) Detects the HermeticWiper Malware
Behavior Detection Detects any variants of HermeticWiper Malware as High Risk
ANN Detects the malware as a Wiper
Threat Hunting
Outbreak Detection
Assisted Response Services Experts to assist you with analysis, containment and response activities.
FortiRecon: ACI
Automated Response Services that can automaticlly respond to this outbreak.
FortiClient Forensics
InfoSec Services Security readiness and awareness training for SOC teams, InfoSec and general employees.
Attack Surface Monitoring (Inside & Outside) Security reconnaissance and penetration testing services, covering both internal & external attack vectors, including those introduced internally via software supply chain.
Threat Intelligence
Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.
Loading ...
Indicators of compromise
IOC Indicator List
Indicators of compromise
IOC Threat Activity
Last 30 days
Chg
Avg 0
Mitre Matrix
Click here for the ATT&CK Matrix
References
Sources of information in support and relation to this Outbreak and vendor.