Technical analysis of CaddyWiper malware

DOI: 10.31673/2409-7292.2023.010006

Authors

  • О. Й. Мацько, (Matsko O. Y.) The National Defence University of Ukraine named after Ivan Cherniakhovskyi, Kyiv
  • І. Ю. Гаврилюк, (Havrylyuk I. Yu.) The National Defence University of Ukraine named after Ivan Cherniakhovskyi, Kyiv
  • Г. Г. Найман, (Nayman H. H.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2023.010006

Abstract

The article examines a new type of malware designed to destroy information resources and media at network endpoints. Discovered in 2022, the CaddyWiper virus destroys user data, separates information from connected drives. The purpose of the work is to study the characteristic features of CaddyWiper to increase the effectiveness of malware detection.

Keywords: CaddyWiper, wiper, destroyer, malware.

References
1. Fernando Martinez. Analysis on recent wiper attacks: examples and how wiper malware works. https://cybersecurity.att.com/blogs/labs-research/analysis-on-recent-wiper-attacks-examples-and-how-they-wiper-malware-works
2. Michael Dereviashkin. New Analysis: the CaddyWiper Malware Attacking Ukraine. Posted April 5, 2022. https://blog.morphisec.com/caddywiper-analysis-new-malware-attacking-ukraine
3. Technical Analysis of New CaddyWiper Malware discovered in Ukraine. https://mikebosland.com/technical-analysis-of-new-caddywiper-malware/
4. eSentire Threat Intelligence Malware Analysis: CaddyWiper. https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-caddywiper
5. Ioan Iacob, Iulian Madalin Ionita. The Anatomy of Wiper Malware, Part 1: Common Techniques. https://www.crowdstrike.com/blog/the-anatomy-of-wiper-malware-part-1/.

Published

2023-01-30

Issue

Section

Articles