Skip to content
Surf Wiki
Save to docs
general/types-of-malware

From Surf Wiki (app.surf) — the open knowledge base

Wiper (malware)

Malware designed to erase files on the host computer


Malware designed to erase files on the host computer

In computer security, a wiper is a class of malware intended to erase (wipe, hence the name) the hard drive or other static memory of the computer it infects, maliciously deleting data and programs.

Examples

A piece of malware referred to as "Wiper" was allegedly used in attacks against Iranian oil companies. In 2012, the International Telecommunication Union supplied Kaspersky Lab with hard drives allegedly damaged by Wiper for analysis. While a sample of the alleged malware could not be found, Kaspersky discovered traces of a separate piece of malware known as Flame.

The Shamoon malware contained a disk wiping mechanism; it was employed in 2012 and 2016 malware attacks targeting Saudi energy companies, and utilized a commercial direct drive access driver known as Rawdisk. The original variant overwrote files with portions of an image of a U.S. flag that is burning. The 2016 variant was nearly identical, except using an image of the body of Alan Kurdi instead.

A wiping component was used as part of the malware employed by the Lazarus Group—a cybercrime group with alleged ties to North Korea, during the 2013 South Korea cyberattack, and the 2014 Sony Pictures hack. The Sony hack also utilized RawDisk.

In 2017, computers in several countries—most prominently Ukraine, were infected by NotPetya, which is a variant of the Petya ransomware that was a wiper in functional sense. The malware infects the master boot record with a payload that encrypts the internal file table of the NTFS file system. Although it still demanded a ransom, it was found that the code had been significantly modified so that the payload could not actually revert its changes, even if the ransom were successfully paid.

Several variants of wiper malware were discovered during the 2022 Ukraine cyberattacks on computer systems associated with Ukraine. Named CaddyWiper, HermeticWiper, IsaacWiper, and FoxBlade by researchers, the programs showed little relation to each other, prompting speculation that they were created by different state-sponsored actors in Russia especially for this occasion.

Some forms of ransomware have also been known to include a wiping component with them.{{cite web|url=https://www.bleepingcomputer.com/news/security/beware-onyx-ransomware-destroys-files-instead-of-encrypting-them/|title=Beware: Onyx ransomware destroys files instead of encrypting them

Solution

Reactive redundancy is a possible solution for data destruction protection. Researchers are able to create systems capable of analyzing write buffers before they reach a storage medium, determine if the write is destructive, and preserve the data under destruction. Moreover regular backups (as long as stored on an external device) provide the ability to restore lost data.

References

References

  1. "Destructive Malware - Five Wipers in the Spotlight".
  2. Zetter, Kim. "Wiper Malware That Hit Iran Left Possible Clues of Its Origins". Wired.com.
  3. Erdbrink, Thomas. (23 April 2012). "Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet". The New York Times.
  4. "Shamoon wiper malware returns with a vengeance". Ars Technica.
  5. Perlroth, Nicole. (2012-08-24). "Among Digital Crumbs from Saudi Aramco Cyberattack, Image of Burning U.S. Flag". The New York Times.
  6. "Inside the "wiper" malware that brought Sony Pictures to its knees [Update]". Ars Technica.
  7. Palilery, Jose. (December 24, 2014). "What caused Sony hack: What we know now". [[CNNMoney]].
  8. "The Sony Hackers Were Causing Mayhem Years Before They Hit the Company".
  9. (28 June 2017). "Tuesday's massive ransomware outbreak was, in fact, something much worse". Ars Technica.
  10. (29 June 2017). "Cyber-attack was about data and not money, say experts". BBC News.
  11. "Sicherheitsforscher finden neue Zerstörungs-Malware auf ukrainischen Computersystemen".
  12. (2025-06-14). "Anubis ransomware adds wiper to destroy files beyond recovery". Bleeping Computer.
  13. (2016-04-11). "Jigsaw Ransomware Decrypted: Will delete your files until you pay the Ransom". Bleeping Computer.
  14. Gutierrez, Christopher N.. (2018-05-01). "Reactive redundancy for data destruction protection (R2D2)". Computers & Security.
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Wiper (malware) — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report