{"id":2983,"date":"2014-01-27T10:40:45","date_gmt":"2014-01-27T15:40:45","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=2983"},"modified":"2020-02-26T15:08:25","modified_gmt":"2020-02-26T15:08:25","slug":"some-malware-just-wants-to-watch-the-world-burn","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/some-malware-just-wants-to-watch-the-world-burn\/2983\/","title":{"rendered":"Some malware just wants to watch the world burn"},"content":{"rendered":"<p>To summarise Costin Raiu, the director of Kaspersky Lab\u2019s research arm, the vast majority of malicious files are what he calls crimeware \u2013\u00a0computer programs deployed by cybercriminals seeking to make a profit by stealing credentials, data, resources, or money directly. The second most prevalent category of malicious software is designed exclusively for cyber-espionage and is used by a variety of advanced threat actors \u2013 often with state, corporate, or other deep-pocketed benefactors. Then there is a third, much smaller category of purely destructive malware \u2013\u00a0sometimes called wipers.<\/p>\n<p>As it turns out, early malware was almost entirely destructive in nature. In the late nineties the Internet was not the vast storage place for valuable data that it is today. In addition to that, organised criminals had yet to see the hard financial value in what was \u2013 at the time \u2013\u00a0easily accessible information. Thus, somewhat like modern <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a>, early hackers designed malware that encrypted hard-drives or corrupted machine data in other ways. There was a playful mischievousness to these early trojans and the people developing them. As far as I know, money was not a significant incentive among early malware-authors.<\/p>\n<p>Destructive, wiper-type malware never really went away, but it\u2019s definitely been revitalised with new fervour purpose in the murky age of alleged nation-to-nation and nation-to-corporation attacks.<\/p>\n<div class=\"pullquote\">Wipers remain a tertiary threat at best; one that you or I don\u2019t really have to actively worry about.<\/div>\n<p>In fact, in the last three years, our friends at <a href=\"http:\/\/www.securelist.com\/en\/blog\/8169\/Destructive_Malware_Five_Wipers_in_the_Spotlight\" target=\"_blank\" rel=\"noopener nofollow\">Securelist<\/a> have examined no less than five separate wiper-style attacks.<\/p>\n<p>The first, merely called <a href=\"https:\/\/www.securelist.com\/en\/blog\/208193808\/\" target=\"_blank\" rel=\"noopener nofollow\">Wiper<\/a>, was so effective that it even wiped itself off the thousands of Iranian computers it is believed to have infected. Because of this, no one was able to examine Wiper malware samples. In comparison to other destructive malware, this threat was seemingly novel, targeting a slew of what appeared to be random machines. Wiper, however, is significant because \u2013 whoever designed it and for whatever purpose \u2013 it may well have been the inspiration for the following four pieces of malware.<\/p>\n<p><a href=\"https:\/\/www.securelist.com\/en\/blog\/208193786\/Shamoon_the_Wiper_Copycats_at_Work\" target=\"_blank\" rel=\"noopener nofollow\">Shamoon<\/a> in particular is thought to have descended from the mysterious Wiper malware. This destructive strain found its way onto the networks of what may be the world\u2019s most valuable company and what is definitely its largest daily oil producer, Saudi Aramco. Shamoon made quick work of the Saudi Arabian Oil Company in August of 2012, destroying more than 30,000 corporate workstations. The malware, which some have said originated in Iran even though a hacker group claimed credit for the attack, did not succeed in erasing itself from existence as Wiper did before it. Researchers got their hands on Shamoon, realising it used crude but effective methods in its attack.<\/p>\n<p>Then there was <a href=\"https:\/\/www.securelist.com\/en\/blog?weblogid=208193954\" target=\"_blank\" rel=\"noopener nofollow\">Narilam<\/a>, a crafty piece of malware that seemed to target the databases of some financial applications used almost exclusively in Iran. Narilam differed to the others here in that it\u2019s a slow acting malware, designed for long-term sabotage. Kaspersky Lab has identified a number of different versions of Narilam, some dating back as far as 2008. While Narilam and threats like it act slowly, they can be quite destructive in the long-term.<\/p>\n<p>There was also the <a href=\"https:\/\/www.securelist.com\/en\/blog\/208194052\/GrooveMonitor_Another_Wiper_Copycat\" target=\"_blank\" rel=\"noopener nofollow\">Groovemonitor<\/a> (aka Maya) malware. Iran\u2019s equivalent to the computer emergency response team first reported what they called Maher in 2012. It\u2019s a fairly simple threat, attacking victim machines more like a bludgeon than a scalpel. Groovemonitor basically has a preset period between two dates. It would attempt to delete every file between those two dates on all machine drives D through I. \u2028The most recent threat, called <a href=\"https:\/\/www.securelist.com\/en\/blog\/208194183\/South_Korean_Whois_Team_attacks\" target=\"_blank\" rel=\"noopener nofollow\">Dark Seoul<\/a>, was used in a coordinated attack targeting several banks and broadcasting companies in Seoul, South Korea. This attack was different from the previous ones in both, because it did not seem to involve a gulf state (Iran or Saudi Arabia), but also because it was incredibly conspicuous, suggesting that the attackers in this case were out for fame rather than clandestine sabotage.<\/p>\n<p>\u201cThe power to wipe tens of thousands of computers at the push of a button or a mouse click represents a powerful asset for any cyber-army,\u201d Raiu wrote in a Securelist report. \u201cThis can be an even more devastating blow when coupled with a real-world kinetic attack to paralyse a country\u2019s infrastructure.\u201d<\/p>\n<p>Wipers remain a tertiary threat at best; one that you or I don\u2019t really have to actively worry about. After all, there isn\u2019t a whole lot that everyday Internet users can do to protect their water or power utilities against a piece of malware that would erase supervisory control and data acquisition or industrial control systems (the hardware and software that controls power grids, manufacturing, etc). These are the sorts of threats that need to be monitored and mitigated by specialised security companies, critical infrastructure holders, and \u2013 perhaps most importantly \u2013 national governments.<\/p>\n<p>The good news \u2013 for users in the United States and its close allies at least \u2013 is that the U.S. Congress will soon vote on the popular, bipartisan, private sector endorsed <a href=\"https:\/\/threatpost.com\/critical-infrastructure-protection-bill-passed-in-committee\/103804\" target=\"_blank\" rel=\"noopener nofollow\">National Cybersecurity and Critical Infrastructure Protection Act of 2013<\/a>. The bill is designed primarily to promote threat-information sharing between the government and the companies that manage critical infrastructure. Similar efforts and legislation are in consideration or already underway in a number of other countries around the world as well.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To summarise Costin Raiu, the director of Kaspersky Lab\u2019s research arm, the vast majority of malicious files are what he calls crimeware \u2013\u00a0computer programs deployed by cybercriminals seeking to make<\/p>\n","protected":false},"author":42,"featured_media":2984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[93,36,510],"class_list":{"0":"post-2983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cybercriminals","9":"tag-malware-2","10":"tag-wipers"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/some-malware-just-wants-to-watch-the-world-burn\/2983\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/some-malware-just-wants-to-watch-the-world-burn\/2861\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/some-malware-just-wants-to-watch-the-world-burn\/2756\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/some-malware-just-wants-to-watch-the-world-burn\/3093\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/some-malware-just-wants-to-watch-the-world-burn\/3585\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/some-malware-just-wants-to-watch-the-world-burn\/2437\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/some-malware-just-wants-to-watch-the-world-burn\/3585\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/some-malware-just-wants-to-watch-the-world-burn\/3585\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cybercriminals\/","name":"cybercriminals"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2983"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2983\/revisions"}],"predecessor-version":[{"id":18923,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2983\/revisions\/18923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/2984"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}