Sandworm hackers use data wipers to disrupt Ukraine's grain sector
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。我先看看文章讲的是什么。 文章主要讲的是俄罗斯支持的黑客组织Sandworm对乌克兰的攻击,使用了多种数据擦除恶意软件,攻击目标包括教育、政府和谷物部门。特别是谷物部门是乌克兰的主要收入来源,所以这次攻击可能影响很大。 然后,文章提到这些攻击发生在六月和九月,由ESET公司报告。数据擦除器不同于勒索软件,纯粹用于破坏。乌克兰自俄罗斯入侵以来一直是多个数据擦除活动的目标,大多数是由俄罗斯国家支持的行为者实施的。 ESET的新报告还提到,在2025年4月至9月期间,APT44部署了多个数据擦除恶意软件变种,特别是针对谷物部门。这显示攻击者现在正关注乌克兰的关键经济部门。 此外,文章还提到伊朗相关的活动集群使用开源工具针对以色列的能源和工程部门。最后建议采取备份、检测系统和软件更新等措施来防御数据擦除攻击。 现在我要把这些信息浓缩到100字以内。重点包括:Sandworm攻击乌克兰的关键部门,使用数据擦除器破坏经济能力;特别是谷物部门;不同于勒索软件;以及防御措施。 所以总结应该是:俄罗斯支持的黑客组织Sandworm对乌克兰的关键部门发动数据擦除攻击,破坏其经济能力。这些攻击不同于勒索软件,专注于破坏而非索取赎金。防御措施包括备份和安全系统。 </think> 俄罗斯支持的黑客组织Sandworm对乌克兰的关键部门实施数据擦除攻击,旨在破坏其经济能力。这些攻击不同于勒索软件,专注于破坏而非索取赎金。防御措施包括关键数据备份和安全系统强化。 2025-11-6 10:15:28 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

Sandworm hackers use data wipers to disrupt Ukraine's grain sector

Russian state-backed hacker group Sandworm has deployed multiple data-wiping malware families in attacks targeting Ukraine's education, government, and the grain sector, the country's main revenue source.

The attacks occurred in June and September, cybersecurity company ESET says in a report today, and continue Sandworm's (a.k.a. APT44) string of destructive operations in Ukraine.

As the name indicates, a data wiper's purpose is to destroy a target's digital information by corrupting or deleting files, disk partitions, and master boot records in a way that does not allow recovery. The impact on the target can be devastating, creating disruptions that are difficult to recover from.

Wiz

Unlike ransomware, where the data is typically stolen and then encrypted, wiper malware is used purely in sabotage operations.

After the Russian invasion, Ukraine has been the target of numerous data wiper campaigns, most of them attributed to Russian state-sponsored actors, including PathWiper, HermeticWiper, CaddyWiper, Whispergate, and IsaacWiper.

Destructive attacks continue

ESET's new report covers advanced persistent threat (APT) activity between April and September 2025 and presents several cases of wipers deployed in Ukraine, some of them targeting the country’s grain production.

This is a new development, as attackers are showing that attackers are now focusing on Ukraine’s vital economic sector, as grain exports are the main source of income, especially during the war.

“In June and September, Sandworm deployed multiple data-wiping malware variants against Ukrainian entities active in the governmental, energy, logistics, and grain sectors,” explains ESET.

“Although all four have previously been documented as targets of wiper attacks at some point since 2022, the grain sector stands out as a not-so-frequent target.”

“Considering that grain export remains one of Ukraine’s main sources of revenue, such targeting likely reflects an attempt to weaken the country’s war economy.”

APT44 also deployed ‘ZeroLot’ and ‘Sting’ wipers in April 2025, targeting a university in Ukraine. Sting was executed through a Windows scheduled task named after the traditional Hungarian dish goulash.

It is noted that initial access for some of these incidents was achieved by UAC-0099, who then transferred the access to APT44 for wiper deployment.

UAC-0099 is a threat actor that has been operating since at least 2023 and appears to concentrate its attacks on Ukrainian organizations.

The researchers note that while Sandworm has recently shown a greater focus on espionage operations, data wiper attacks against Ukrainian entities remain a continuous activity for the threat group.

ESET also identified Iran-aligned activity that couldn’t be attributed to a specific threat group, but it is consistent with tactics, techniques, and procedures (TTPs) associated with Iranian hackers.

In June 2025, these activity clusters deployed Go-based tools based on publicly available open-source wipers, targeting Israel’s energy and engineering sectors.

Much of the guidance for preventing ransomware also helps defend against data wipers. A key step is keeping critical data backups on offline media, out of reach of hackers.

Implementing strong endpoint detection and intrusion prevention systems and maintaining all software updated could prevent a wide range of attacks, including data wiping incidents.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/sandworm-hackers-use-data-wipers-to-disrupt-ukraines-grain-sector/
如有侵权请联系:admin#unsafe.sh