August 7, 2019 By David Bisson < 1 min read

Researchers spotted a new malware family called GermanWiper that masquerades as ransomware but destroys affected data even when victims pay the ransom.

Bleeping Computer first learned of GermanWiper on July 30 when victims began posting about it on the site’s forums. According to the researchers, the malware began by leaving a ransom note prompting the victim to pay 0.15038835 bitcoins for a decryption key. But the sample they analyzed didn’t encrypt the victim’s data. Instead, it overwrote each file’s data with ones and zeroes, effectively destroying its contents.

According to Bleeping Computer, digital attackers distributed GermanWiper primarily in Germany through a spam campaign. The attack email masqueraded as a job application from a person named Lena Kretschmer. It contained an attachment named Unterlagen_Lena_Kretschmer.zip, which carried malicious PDF documents that downloaded the malware’s executable via a PowerShell command.

More Wiper Malware Disguised as Ransomware

Data wipers have been assuming ransomware as a disguise for years. In June 2017, IBM X-Force Incident Response and Intelligence Services (IRIS) analyzed the international outbreak of NotPetya malware and concluded that attackers were not financially motivated; they aimed simply to destroy data.

Just a few months later, SpamTitan reported on Ordinypt, another wiper family that targeted Germany posing as ransomware. Just a few months after that, Cisco Talos observed how some variants of LockerGoga were effectively preventing users from logging back onto their infected systems following the encryption process, thus rendering their infections destructive.

Defend Your Data Against GermanWiper

Security professionals can help defend against GermanWiper by using an endpoint management solution to provide visibility into the company’s assets and help streamline the process of patching known vulnerabilities. Security teams should also employ a layered defense strategy that draws on antimalware solutions, security awareness training and data backups to defend against destructive malware attacks.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today