Monday January 30, 2023
Advertisement
Edit
The Current Bite The Current Bite
  • most recent news
  • trending news
  • most read
  • All Video
  • Image gallery
  • more
Technology

Introducing Windows 11

August 21, 2021
Technology

Launching Mi 5X Series

August 26, 2021
Mobile

Infinix Hot 11S India

August 27, 2021
News

Xiaomi to invest $10bn

September 1, 2021
News

FBI Alerts About Hive

September 1, 2021
Mobile

OnePlus Buds Pro Matte

September 2, 2021
  • Accessibility
  • Help
  • Contact
  • About qoxag
The Current Bite The Current Bite

Breaking News

Ved- | Trailer | Riteish Deshmukh | Genelia Deshmukh |

Akshay Kumar as Chhatrapati Shivaji Maharaj in Mahesh Manjrekar’s Vedat

Cisco Confirms it has been Hacked by Yanluowang Ransomware Gang

The Big Bull of Dalal Street Rakesh Jhunjhunwala Passes Away

Elon Musk has cancelled Twitter 44$ Billion Deal

Dangerous new malware dances past more than 50 antivirus services

Tips for how transfer whatsapp chat from Android to Iphone

iPadOS 16 with new features:- Stage Manager, Weather app, Metal

Broadcom to acquiring VMware for $61 billion – BROADCOM

The Indian government directs organizations to report security breaches to

The Current Bite The Current Bite
  • Home
  • News
  • Technology
  • Entertainment
  • Sports
  • Gadgets
  • Finance
  • TCB-How to
  1. Home
  2. News
  3. Microsoft Warns of Destructive Cyberattack on Ukrainian
 Microsoft Warns of Destructive Cyberattack on Ukrainian
News Technology

Microsoft Warns of Destructive Cyberattack on Ukrainian

by VICKY January 20, 2022 0 Comment

Microsoft identified a unique destructive malware operated by an actor tracked as DEV-0586 targeting Ukrainian organizations. Observed activity, TTPs, and IOCs shared in this new MSTIC blog. We'll update the blog as our investigation unfolds. https://t.co/wBB82gp6TX

— Microsoft Security Intelligence (@MsftSecIntel) January 16, 2022

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in Ukraine and surrounding region and encourages organizations to use the information in this post to proactively protect from any malicious activity.

At present and based on Microsoft visibility, our investigation teams have identified the malware on dozens of impacted systems and that number could grow as our investigation continues. These systems span multiple government, non-profit, and information technology organizations, all based in Ukraine. We do not know the current stage of this attacker’s operational cycle or how many other victim organizations may exist in Ukraine or other geographic locations. However, it is unlikely these impacted systems represent the full scope of impact as other organizations are reporting.

“This is not the first time or even the second time that Ukrainian Internet resources have been attacked since the beginning of the Russian military aggression,” the Ukrainian Information Ministry said in a statement.

Stage 1: Overwrite Master Boot Record to display a faked ransom note

The malware resides in various working directories, including C:\PerfLogs, C:\ProgramData, C:\, and C:\temp, and is often named stage1.exe. In the observed intrusions, the malware executes via Impacket, a publicly available capability often used by threat actors for lateral movement and execution.

Stage 2: File corrupter malware

Stage2.exe is a downloader for a malicious file corrupter malware. Upon execution, stage2.exe downloads the next-stage malware hosted on a Discord channel, with the download link hardcoded in the downloader. The next-stage malware can best be described as a malicious file corrupter. Once executed in memory, the corrupter locates files in certain directories on the system with one of the following hardcoded file extensions:

Recommended customer actions

MSTIC and the Microsoft security teams are working to create and implement detections for this activity. To date, Microsoft has implemented protections to detect this malware family as WhisperGate (e.g., DoS:Win32/WhisperGate.A!dha) via Microsoft Defender Antivirus and Microsoft Defender for Endpoint, wherever these are deployed on-premises and cloud environments. We are continuing the investigation and will share significant updates with affected customers, as well as public and private sector partners, as get more information. The techniques used by the actor and described in the this post can be mitigated by adopting the security considerations provided below:

 

Detections

Microsoft 365 Defender

 

Share This:

  • 1
    Facebook
Tags: #cyberattackonukraine #microsoftwarnsukraine #tcb #technology
Previous post
Next post

VICKY

administrator

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Entertainment
  • Finance
  • Gaming
  • Mobile
  • Movies Trailers
  • News
  • Sports
  • TCB-How to
  • Technology
  • Uncategorized
Most Recent
Entertainment

Ved- | Trailer | Riteish Deshmukh |

December 15, 2022
Entertainment

Akshay Kumar as Chhatrapati Shivaji Maharaj in

December 6, 2022
News

Cisco Confirms it has been Hacked by

August 16, 2022
Finance

The Big Bull of Dalal Street Rakesh

August 14, 2022
Social Profile

Daily Newsletter

Get all the top stories from Qoxag to keep track.

RELATED Stories for you
News Technology

Dangerous new malware dances past more than

by VICKY July 9, 2022

Specialists have found a new malware test fit for stowing away from more than

Mobile Technology

Tips for how transfer whatsapp chat from

by VICKY June 21, 2022

The year before, WhatsApp announced a new feature that lets users transfer their chat

Entertainment Movies Trailers

Bachchhan Paandey | Official Trailer | Akshay

by VICKY February 18, 2022

Myra Devekar is an aspiring director is given a task by him to come

Copyright © 2023 Teqtive Solutions. All Right Reserved.