Analysis and Mitigations of Wiper Malware Variants Used Against Ukraine

Understanding and Combatting Wiper Malware: A Deep Dive into the Ukraine Conflict's Cyber Aspect

The ongoing Ukraine War has involved components across all threat dimensions including physical conflict, disinformation, supply chain disruptions, and of course, cyber. Leading up to and throughout the war, several destructive cyber attacks launched against various entities, bringing the conflict to cyberspace and increasing the uncertainty of whether the wiper malware variants could affect networks and companies outside of Ukraine by way of spillover.

To understand the malware variants used for these attacks, their effects, and mitigation strategies, threat intelligence analysts from Recorded Future's research arm, Insikt Group hosted a discussion providing a high-level comparative overview of the 9 known wiper variants associated with the ongoing Ukraine War.

This webinar provided insight into the similarities and differences between the tools, the implications at a geopolitical level, and mitigation considerations in the event of spillover.

Watch this on-demand recording for:

  • An understanding of what wiper malware is and how it’s used
  • A detailed comparison of the 9 wiper malware variants used against Ukraine
  • Mitigation considerations in the event of spillover attacks


 

Watch the Session Now

Understanding and Combatting Wiper Malware: A Deep Dive into the Ukraine Conflict's Cyber Aspect

The ongoing Ukraine War has involved components across all threat dimensions including physical conflict, disinformation, supply chain disruptions, and of course, cyber. Leading up to and throughout the war, several destructive cyber attacks launched against various entities, bringing the conflict to cyberspace and increasing the uncertainty of whether the wiper malware variants could affect networks and companies outside of Ukraine by way of spillover.

To understand the malware variants used for these attacks, their effects, and mitigation strategies, threat intelligence analysts from Recorded Future's research arm, Insikt Group hosted a discussion providing a high-level comparative overview of the 9 known wiper variants associated with the ongoing Ukraine War.

This webinar provided insight into the similarities and differences between the tools, the implications at a geopolitical level, and mitigation considerations in the event of spillover.

Watch this on-demand recording for:

  • An understanding of what wiper malware is and how it’s used
  • A detailed comparison of the 9 wiper malware variants used against Ukraine
  • Mitigation considerations in the event of spillover attacks


 

Ready to get started? Sign up now!

Recommended Content

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Ut Enim Minima

Sed ut perspiciatis unde omnis iste natus error sit voluptatem!

Sed ut perspiciatis

Sed ut perspiciatis unde omnis iste natus error sit voluptatem!

Error sit voluptatem!

Sed ut perspiciatis unde omnis iste natus error sit voluptatem!

Consectetur adipiscing elit...

Lorem C.

"Et harum quidem rerum facilis est et expedita distinctio!"

Ipsem T.

"Et harum quidem rerum facilis est et expedita distinctio!"

Aoeren T.

"Et harum quidem rerum facilis est et expedita distinctio!"