logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Update – Threat Actors Uses New Golang-based ‘SwiftSlicer’ Wiper To Target Ukraine

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
    Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
    Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – LockBit Ransomware – Active IOCs
    Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Update – Threat Actors Uses New Golang-based ‘SwiftSlicer’ Wiper To Target Ukraine

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
    Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
    Severity High Analysis Summary The Mirai botnet is a type of malware that infects Internet of Things (IoT) devices, such as routers, security cameras, and other […]
    March 21, 2023
    March 21, 2023
    Rewterz Threat Alert – LockBit Ransomware – Active IOCs
    Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Alert – New Mimic Ransomware Uses Everything APIs for Encryption Process – Active IOCs
January 30, 2023
Rewterz
Rewterz Threat Alert – Trickbot Malware – Active IOCs
January 31, 2023

Rewterz Threat Update – Threat Actors Uses New Golang-based ‘SwiftSlicer’ Wiper To Target Ukraine

January 30, 2023

Severity

High

Analysis Summary

Ukraine hit with a new Golang-based ‘SwiftSlicer’ Wiper Malware in a latest cyber attack. The attack has been attributed to Sandworm, a nation-state group linked to Military Unit 74455 of the GRU (Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation). 

SwiftSlicer is a newly discovered data wiper that has been used in attacks against Ukrainian targets by the Russian state-sponsored Sandworm APT group. Sandworm, also known as Military Unit 74455 of the GRU, has been active for several years and is known for its use of various malicious tools and techniques. The group has been linked to various high-profile cyber attacks and has been associated with the NotPetya wiper malware. The deployment of SwiftSlicer highlights the group’s continued evolution and ability to adapt to new techniques to achieve their goals.

According to researchers, SwiftSlicer is capable of deleting shadow copies and overwriting files, including those in the system directory, using randomly generated byte sequences, before rebooting the computer. 

“Once executed it deletes shadow copies, recursively overwrites files located in %CSIDL_SYSTEM%\drivers, %CSIDL_SYSTEM_DRIVE%\Windows\NTDS and other non-system drives and then reboots computer,” researchers disclosed on twitter.

The intrusion was discovered on January 25, 2023. Sandworm, also known as BlackEnergy, Electrum, Iridium, Iron Viking, TeleBots, and Voodoo Bear, has been responsible for disruptive and destructive cyber campaigns targeting organizations globally since 2007. The group has been linked to various high-profile cyber attacks and has been associated with the NotPetya wiper malware. The deployment of SwiftSlicer highlights the group’s continued evolution and ability to adapt to new techniques to achieve their goals. In 2022, during Russia’s military invasion of Ukraine, Sandworm launched attacks using WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, Industroyer2, Prestige, and RansomBoggs against critical infrastructure in the country. 

The discovery of SwiftSlicer highlights the consistent use of wiper malware variants by Russia’s adversarial group in attacks aimed at causing disruption in Ukraine. This is also a demonstration of the growing use of Golang by threat actors, due to its multi-platform support and ease of development. 

The Emergency Response Team of Ukraine has linked Sandworm to a recent cyber attack on the national news agency Ukrinform, which took place no later than December 7, 2022. The attack used five different data wiping programs – CaddyWiper, ZeroWipe, SDelete, AwfulShred, and BidSwipe – targeting Windows, Linux, and FreeBSD systems. The final stage of the attack was initiated on January 17, 2023, but only had partial success, particularly with regard to several data storage systems. 

“It was established that the final stage of the cyber attack was initiated on 17.01.2023, however, it was only partially successful, in particular, in relation to several data storage systems.”

Sandworm is one of several Russian state-sponsored APT groups that have been known to target Ukrainian organizations. APT29, also known as Cozy Bear, is another well-known group that has been active since at least 2008 and has been involved in numerous high-profile cyber attacks, including the 2016 US Presidential election. COLDRIVER is another group that has been active since at least 2013 and has been known to target Ukrainian government organizations. Gamaredon is another APT group that has been active since at least 2014 and is primarily focused on the Ukrainian government and military. These groups demonstrate the ongoing threat of nation-state sponsored cyber attacks against Ukraine and the importance of having robust cybersecurity measures in place to protect against these types of threats.

Impact

  • Cyber Warfare
  • Disruption and Destruction Of Data

Remediation

  • Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
  • Ensure that general security policies are employed including: implementing strong passwords, correct configurations, and proper administration security policies.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Maintain daily backups of all computer networks and servers.
  • Enforced Access Management Policies
  • Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
  • Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
  • Implement a multilayered strategy as it could assist organizations in protecting potential entry points into the system (endpoint, email, web, and network).
  • It is also recommended to educate employees about safe computing practices, such as avoiding suspicious emails and attachments and reporting any suspected security incidents to the IT department immediately. In the case of a confirmed infection, organizations should engage a cybersecurity professional to help contain the damage and restore normal operations.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo