30 July 2021

New destructive wiper malware linked to recent Iranian railway attack


New destructive wiper malware linked to recent Iranian railway attack

It appears that the destructive cyberattack against Iranian train system that took place earlier this month was caused by a previously undocumented wiper malware.

Following the reports about the incident, security researchers with SentinelOne conducted their own investigation and discovered a destructive wiper component, which they dubbed ‘Meteor’, capable of deleting data on the infected systems.

According to SentinelOne threat hunter Juan Andres Guerrero-Saade, this is the first known case where this wiper was deployed. He said that it was developed in the past three years and appears designed for reuse in multiple campaigns.

The attack, named ‘MeteorExpress’, involved a toolkit of batch files and executables to wipe a system, lock the device's Master Boot Record (MBR), and install a screen locker. The Meteor wiper was just a part of the toolkit used in the attack, along with two other components – a file named mssetup.exe used to lock the user out of their PC, and nti.exe used for corrupting the victim computer’s master boot record (MBR).

In addition to wiping files, Meteor deletes shadow copies and removes the machine from the domain to avoid means of quick remediation. It also comes with additional functionality, such as the ability to change passwords for all users, disable screen servers, terminate processes, creating processes and execute commands, etc., although in the observed attack most of functionality was not used, the researchers said.

“We cannot yet make out the shape of this adversary across the fog. Perhaps it’s an unscrupulous mercenary group. Or the latent effects of external training coming to bear on a region’s nascent operators. At this time, any form of attribution is pure speculation and threatens to oversimplify a raging conflict between multiple countries with vested interests, means, and motive,” Guerrero-Saade noted.


Back to the list

Latest Posts

Turla APT targets entities in US, Germany and Afghanistan with new backdoor

Turla APT targets entities in US, Germany and Afghanistan with new backdoor

The TinyTurla backdoor is used to maintain access to the target system even if the primary malware is discovered and removed.
22 September 2021
Microsoft shares details on huge BulletProofLink PHaaS

Microsoft shares details on huge BulletProofLink PHaaS

BulletProofLink has been active since 2018 and is currently advertised on underground hacker forums.
22 September 2021
US Treasury sanctions Suex cryptocurrency exchange linked to ransomware operations

US Treasury sanctions Suex cryptocurrency exchange linked to ransomware operations

The Treasury Department said that over 40 percent of Suex known transactions is associated with illegal activity.
22 September 2021