Russia’s Sandworm hackers deploying wipers against Ukraine’s grain industry
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,理解其主要内容和重点。 文章主要讲的是俄罗斯支持的黑客组织Sandworm对乌克兰的谷物行业进行了攻击。他们使用了多种数据擦除恶意软件,影响了乌克兰的农业、能源和物流部门。Sandworm之前也参与过多次重大网络攻击事件,比如2015年的电力中断和2017年的NotPetya事件。最近的攻击包括使用Zerolot和Sting这两种擦除器,还有另一个黑客组织UAC-0099的协助。 乌克兰方面警告说,这些网络攻击通常与导弹和无人机袭击配合进行,以增强破坏效果。此外,俄罗斯的其他黑客组织还在继续针对欧盟国家进行攻击,目标是与乌克兰防御相关的实体。 总结的时候,我需要抓住几个关键点:Sandworm攻击乌克兰谷物行业、使用数据擦除软件、影响多个部门、历史上的攻击记录、最近的行动以及对国际的影响。同时要控制在100字以内。 可能会遇到的问题是如何在有限的字数内涵盖所有重要信息而不遗漏关键点。可能需要简化一些细节,比如提到UAC-0099但不详细展开。 最后,确保语言简洁明了,直接描述文章内容。 </think> 俄罗斯支持的黑客组织Sandworm针对乌克兰谷物行业发动数据擦除攻击,影响农业、能源及物流部门。该组织曾参与多次重大网络攻击事件,并持续对乌目标实施破坏性行动。 2025-11-6 13:1:9 Author: therecord.media(查看原文) 阅读量:39 收藏

Ukraine’s grain industry has become the latest target of the notorious Russian state-backed hacking unit Sandworm, amid Moscow's ongoing efforts to undermine the country’s wartime economy.

According to new research from the Slovak cybersecurity firm ESET, the Kremlin-linked group deployed multiple data-wiping malware strains against Ukrainian organizations in the grain, energy, logistics, and government sectors between June and September. While wiper attacks have frequently hit Ukrainian infrastructure since Russia’s invasion, the agricultural industry — a key source of the country’s export revenue — has rarely been targeted directly.

Sandworm, which Western intelligence agencies link to Russia’s military intelligence service (GRU), is behind some of the most damaging cyberattacks in Ukraine’s history — including the 2015 power grid blackout, the 2017 NotPetya malware outbreak, and last year’s hack of major telecom provider Kyivstar.

ESET said the recent operations included two wipers, Zerolot and Sting, deployed in April against a Ukrainian university, followed by additional waves against grain and energy firms. Wiper malware is designed to permanently erase data and disrupt operations.

The company also linked the attacks to another hacker group, known as UAC-0099, which allegedly carried out initial intrusions before passing access to Sandworm. UAC-0099 has been active since at least 2022, targeting Ukrainian government and defense institutions in espionage campaigns, according to Ukraine’s computer emergency response team (CERT-UA).

“These destructive attacks by Sandworm are a reminder that wipers remain a frequent tool of Russia-aligned threat actors in Ukraine,” ESET said.

Although some reports suggested a shift toward espionage activities by such groups in late 2024, researchers said Sandworm has continued to conduct wiper attacks against Ukrainian entities on a regular basis since early 2025.

Ukraine’s cyber authorities have repeatedly warned that Russian threat actors, including Sandworm, often coordinate such operations with missile and drone strikes to amplify their impact.

Beyond Ukraine, ESET noted that Russian hacking groups including RomCom and Gamaredon continue targeting European Union member states, often focusing on entities linked to Ukraine’s defense or logistics networks.

“Even non-Ukrainian targets often present some apparent links with Ukraine and its overall war effort,” the researchers wrote, “strongly suggesting that the conflict continues to mobilize most of Russia’s intelligence attention and resources.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russia-sandworm-grain-wipers
如有侵权请联系:admin#unsafe.sh