Symantec's Eric Chien tells me: "We are seeing the wiper across multiple organizations in different sectors in the Ukraine including finance and government organizations. The wiper uses a legitimate driver to gain low level hard disk access to wipe data."
"We haven't yet documented the full attack chain," Chien says, "but it is clear in some organizations they had credentialed access already."
Aligns with what ESET tweeted about Active Directory access.
Chien says Symantec is also seeing the wiper in Lithuania, "but at this time it isn't clear if these are distinct organizations."
These could be infections of Ukrainian companies with international offices.
Symantec hasn't seen attacks on companies based outside of Ukraine.
Jean-Ian Boutin, head of ESET's threat research team, says the wiper targeted "large organizations."
"The malware based on its time stamp was created two months ago, however it was deployed only today and we have seen it only in Ukraine."
ESET has seen "several organizations targeted" but isn't ready to provide numerical estimates, a spokesperson says. They've seen more than the two organizations cited by Symantec.
Symantec's Chien says the government organizations they're seeing targeted by the wiper are contractors involved in "supporting the military sector."
Number of targets likely to change rapidly as analysts review data. Symantec has seen 3 as of now, but don't read much into that.
As of now, Symantec has seen the wiper Ukraine, Latvia, and Lithuania, per a statement a few minutes ago from their PR team.
They reiterate that so far they've seen attacks on financial companies and government contractors. (Chien told me they're military contractors.)
Ukraine #HermeticWiper malware is "incredibly thorough," @juanandres_gs told me tonight. "It's got at least five or six different ways that it's trashing different aspects of the operating system."
"It makes WhisperGate look like it was written by script kiddies," he said.
#HermeticWiper will look for as many as 100 physical drives to erase, trash the Master Boot Record, trash user folders, trash the Windows Registry, and then target the filesystem "and actually try to wipe things by sector," Guerrero-Saade said.
The wiper exploits a Microsoft feature that configures settings across multiple computers on a network, so it's designed for networks where the attacker has that kind of broad access.
It's "fire-and-forget," Guerrero-Saade said, compared to WhisperGate, which needed more input.
Guerrero-Saade likened #HermeticWiper to Shamoon (Saudi Aramco hack) and Destover (Sony hack) in that it deploys and abuses a driver for a legitimate program (in this case, EaseUS Partition Manager) to bypass the normal obstacles to deep hard-drive control that malware faces.
#HermeticWiper also doesn't appear to work on Windows 10, Guerrero-Saade told me, which is fine for Ukraine, where most computers run older versions of Windows — in many cases, pirated versions.
#HermeticWiper accepts command-line arguments, suggesting that the hackers could have deployed it via a script, according to CrowdStrike's @Adam_Cyber.
The two commands tell the malware:
(1) how long to stay asleep on a target before activating (2) when to shut the PC down
Meyers called #HermeticWiper "pretty nasty" and noted that it disables a Windows security feature called Volume Shadow Copy, which creates backups of files. A lot of ransomware does this.
"It takes some care to make sure that it's going to make a big mess for the target."
In case you're wondering where the malware's name comes from: Symantec says it's delivered "in the form of an executable file, which is signed by a certificate issued to Hermetica Digital Ltd. "
Needless to say, this is an incredibly precarious moment and the U.S. will need to be very careful about calibrating any cyberattacks to avoid catastrophic reprisals. Putin has given apocalyptic warnings about what he'll do if the West tries to stop him.
.@emilyhorne46 slaps down NBC's story about Biden being presented with aggressive cyber retaliation options.
"This report is wildly off base and does not reflect what is actually being discussed in any shape or form." (via @magmill95)
Centralizing data in Kyiv robbed Russia of easy access to files and services previously accessible from now-occupied computers in Crimea, Luhansk, and Donetsk. It also prevented those now-untrustworthy computers from becoming backdoors into Ukrainian networks.
Ukraine's locally distributed computer system was the product of historically slow internet speeds that prevented large, frequent data transfers. But the country's modernization meant it could move everything to web platforms based in Kyiv (with multiple backup sites).
White House briefing starting now. Anne Neuberger, deputy national security adviser for cyber, is one of the speakers.
Neuberger: “While there are currently no specific or credible cyber threats to the homeland, the U.S. government has been preparing for potential geopolitical contingencies since before Thanksgiving.”
Essentially confirming recent WaPo story, Neuberger says USG "believes that Russian cyber actors likely have targeted the Ukrainian government, including military and critical infrastructure networks, to collect intelligence & preposition to conduct disruptive cyber activities."
During panel at Munich Cybersecurity Conference, FBI Cyber Division's Tonya Ugoretz says "international standardization" of AML rules for cryptocurrency "would greatly help" stop ransomware. Many countries don't have consistent rules, so even well-meaning exchanges can't help.
Ugoretz: "Sometimes foreign exchanges want to be cooperative...but because they don't have that existing framework that provides consistency in the types of information that they're collecting about their customers, they may not even have the information on hand to provide..."
On ransomware, DHS Under Secretary for Policy Rob Silvers says “we are taking this problem on from all angles, and it's among our very highest cybersecurity priorities.” He notes stopransomware.gov, various alerts and guidance docs, and partnerships with other agencies.