In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations that occurred in January and February 2022. We have already provided a detailed analysis of the WhisperGate wiper here.
The Russian APT group Gamaredon (Primitive Bear, ACTINIUM) was attributed to the Russian Federal Security Service (FSB) and was identified by Unit 42 researchers  and Microsoft  targeting Ukrainian organizations in the last few months. Unit 42 collected three significant clusters of infrastructure (malicious domains, IP addresses, and malware samples).
The first cluster represents the Gamaredon downloader infrastructure. The threat actor deployed the UltraVNC software to connect back to a remote system (reverse tunnel). The second cluster contains C2 domains associated with Gamaredon’s file stealer tool. The last cluster serves as the C2 infrastructure for a custom RAT called Pteranodon. We recommend blocking the IoCs reported by Unit 42  .
An example of a lure document used by Gamaredon in the past is displayed in figure 1.
Figure 1 (Source: Microsoft)
After the WhisperGate attacks that occurred in January 2022, several cybersecurity companies reported about a new wiper called HermeticWiper   . Before deploying the wiper, multiple DDoS attacks took place against Ukrainian organizations that were attributed to Russia’s Main Intelligence Directorate (GRU).
The wiper was signed with a certificate issued to a Cyprus-based company called Hermetica Digital Ltd. Legitimate drivers from a tool called EaseUS Partition Master were utilized to corrupt the MBR (Master Boot Record) and MFT (Master File Table) for every physical drive. After a system reboot, the user is presented with the following screen:
Figure 2 (Source: Unit 42)
CISA also issued an alert regarding the WhisperGate and HermeticWiper wipers . We recommend implementing the mitigation techniques presented in the alert to prevent similar attacks.
ESET researchers documented a new wiper called IsaacWiper, and a worm that spreads HermeticWiper in the LAN called HermeticWizard . HermeticWiper is spread across a local network via WMI and SMB. IsaacWiper wipes the first 0x10000 bytes of each physical disk using the ISAAC pseudorandom generator and all files on logical drives with random bytes generated by the same generator. A timeline of the events is shown below:
Figure 4 (Source: ESET)
Any Ukraine-based company for the next 6 months can get entirely free access to SecurityScorecard’s enterprise license to protect themselves from malware resilience in light of ongoing cyber-attacks. We are also providing them with free access to SecurityScorecard forensics remediation team to deal with ransomware issues or to recover from any outage. Simply email Ukraine@securityscorecard.io.