Alert - Wiper malware targeting Ukrainian organizations

Number: AL22-001
Date: January 17, 2022   

Audience

This Alert is intended for IT professionals and managers of notified organizations.

Purpose

An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.

Overview

Microsoft Threat Intelligence Center (MSTIC) published a blog post detailing a malware campaign targeting multiple Ukrainian organisations Footnote 1.

Details

On 15 January 2022, MSTIC published a blog post highlighting a malware campaign targeting Ukrainian organisations in various sectors. The United States Cybersecurity & Infrastructure Security Agency (CISA) amplified this publication on 16 January 2022  2 .

MSTIC indicates that initial evidence of this campaign surfaced on victim systems in Ukraine on January 13, 2022. Affected sectors currently include government, non-profit, and information technology, with the possibility of more organisations and sectors being affected as the situation evolves. Microsoft states, “MSTIC is not able to assess intent of the identified destructive actions but does believe these actions represent an elevated risk to any government agency, non-profit or enterprise located or with systems in Ukraine.” ootnote 1

The malware being delivered purports to be ransomware, as a ransom note is provided, but there is no mechanism for recovery and targeted devices are inoperable after infection. The malware overwrites the contents of the master boot record (MBR), a small portion of the hard drive that tells the computer how to load its operating system when the computer is powered on. In addition, second-stage malware downloads and executes malicious code designed to overwrite files containing specific file extensions (see MSTICs blogFootnote 1 for a list of 189 file extensions so far).

The MSTIC blog post also provides indicators of compromise and other recommended actions for system owners and operators responsible for defending their systems and networks from cyber threats. Microsoft advises monitoring their blog post as it will be updated if the situation evolves.

Should activity matching the content of this Alert be discovered, recipients are encouraged to report via the My Cyber Portal, contact the Cyber Centre by email (contact@cyber.gc.ca), or by telephone (1-833-CYBER-88 or 1-833-292-3788).

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: