RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Threat ResearchFebruary 2, 2023

The Week in Security: Russia takes aim at Ukraine with Sandworm, the truth about Russia's top search engine

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Security: Russia takes aim at Ukraine with Sandworm, the truth about Russia's top search engine

This week: A Russian APT group is using several malware strains to attack entities in Ukraine. Also: A massive Yandex code leak reveals the ranking factors of Russia’s search engines.

This Week’s Top Story

Russia-affiliated APT Sandworm uses multiple malware wiper strains to attack Ukrainian entities

Just shy of Russia’s war on Ukraine reaching its 12 month-mark, ESET has discovered a new malware wiper strain being used by Sandworm, a Russia-affiliated advanced persistent threat (APT) group. The Hacker News reports that the wiper, dubbed NikoWiper, was used in Sandworm’s attack on a Ukrainian energy sector company in October 2022. According to ESET, this attack coincided with Russian missile strikes aimed at Ukraine’s energy infrastructure, suggesting a shared objective behind both attacks.

Malware wiper strains have become a favored attack method for targeted incidents this past year, and several strains have been used to attack Ukraine throughout the timeline of the war. This kind of malware, once installed, deletes all of the files on an impacted system, causing devastating losses for victims, giving it the name “wiper.”

NikoWiper, while unique in its design compared to other strains, is just one of the wipers that Sandworm has been caught using. ESET recently discovered that the group used a Golang-based data wiper dubbed SwiftSlicer on an unnamed Ukrainian entity on Jan 25, 2023. The Hacker News also reports that the APT group has used as many as five different wiper strains (CaddyWiper, ZeroWipe, SDelete, AwfulShred, and BidSwipe) in an attack on Ukrinform, a Ukrainian national news agency. Sandworm has even used Prestige and RansomBogs, two ransomware families, to lock victim data using encryption barriers.

In an interview with The Hacker News, expert Dmitry Bestuzhev shared that the APT group has been “actively working on developing wipers and ransomware families used explicitly for Ukraine.” Given that Sandworm’s most recent attack happened last week, it is likely that cyberattacks by this group will continue as we enter year two of the Russo-Ukrainian war.

News Roundup

Here are the stories we’re paying attention to this week…

Massive Yandex code leak reveals Russian search engine's ranking factors (ArsTechnica)

Nearly 45GB of source code files, allegedly stolen by a former employee, have revealed the underpinnings of Russian tech giant Yandex's many apps and services. It also revealed key ranking factors for Yandex's search engine, the kind almost never revealed in public.

CISA: Federal agencies hacked using legitimate remote desktop tools (BleepingComputer)

CISA, the NSA, and MS-ISAC warned in a joint advisory that attackers are increasingly using legitimate remote monitoring and management (RMM) software for malicious purposes. Also, CISA discovered malicious activity within the networks of multiple federal civilian executive branch (FCEB) agencies using the EINSTEIN intrusion detection system.

Ransomware payments are down (Schneier on Security)

Chainanalysis reports that worldwide ransomware payments were down in 2022: Ransomware attackers extorted at least $456.8 million from victims in 2022, down from $765.6 million the year before.

Researchers uncover packer used by several malware to evade detection for 6 years (The Hacker News)

A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of malware such as TrickBot, Emotet, AZORult, Agent Tesla, FormBook, Cerber, Maze, and REvil over the years.

Microsoft Defender can now isolate compromised Linux endpoints (BleepingComputer)

Microsoft announced today that it added device isolation support to Microsoft Defender for Endpoint (MDE) on onboarded Linux devices. Enterprise admins can manually isolate Linux machines enrolled as part of a public preview using the Microsoft 365 Defender portal or via API requests.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Threat Research

More Blog Posts

Graphalgo supply chain campaign respawned.

Graphalgo fake recruiter campaign returns

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

Learn More about Graphalgo fake recruiter campaign returns
Graphalgo fake recruiter campaign returns
TeamPCP supply chain attack

The TeamPCP supply chain attack evolves

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

Learn More about The TeamPCP supply chain attack evolves
The TeamPCP supply chain attack evolves
Malicious npm packages use fake install logs to load RAT

Fake install logs in npm packages load RAT

The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.

Learn More about Fake install logs in npm packages load RAT
Fake install logs in npm packages load RAT
Inside the NuGet hack toolset

Inside the NuGet hackers' toolset

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Learn More about Inside the NuGet hackers' toolset
Inside the NuGet hackers' toolset

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top