New PathWiper malware targets critical infrastructure in Ukraine

New PathWiper malware targets critical infrastructure in Ukraine

Cybersecurity researchers at Cisco Talos have uncovered a new destructive malware variant they dubbed “PathWiper,” which was used in a recent cyberattack against a critical infrastructure entity in Ukraine. The attack has been attributed to a Russia-linked state-sponsored hacker group.

According to Talos, PathWiper was deployed through a legitimate endpoint administration framework, indicating that the attackers had compromised the administrative console used to manage enterprise endpoints. Once inside, they issued malicious commands that triggered the deployment of the wiper malware across multiple systems.

The malware execution chain began with a batch file command that launched a malicious VBScript named uacinstall.vbs. The attackers disguised their activity to mirror legitimate administrative actions.

PathWiper shares several characteristics with HermeticWiper, also tracked in the cybersecurity community as FoxBlade or NEARMISS, which was used in 2022 attacks against Ukraine and attributed to Russia’s Sandworm APT group. Both malware families designed to corrupt the master boot record (MBR) and damage NTFS artifacts to render systems inoperable.

However, PathWiper comes with a more sophisticated disk corruption technique. Unlike HermeticWiper, which attempts to damage physical drives by brute force enumeration, PathWiper programmatically identifies all connected and dismounted drives, verifies volume labels, and targets specific volumes with precision.

“Talos attributes this disruptive attack and the associated wiper to a Russia-nexus advanced persistent threat (APT) actor. Our assessment is made with high confidence based on tactics, techniques and procedures (TTPs) and wiper capabilities overlapping with destructive malware previously seen targeting Ukrainian entities,” the team said.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025