DynoWiper Malware Used in Data-Wiping Attacks Against Targets

Related

Apache Syncope Vulnerability Lets Attackers Hijack User Sessions

What happened A critical XML External Entity (XXE) vulnerability in...

Malicious App on Google Play With 50K+ Downloads Steals Credentials and Pushes Ads

What happened Zscaler ThreatLabz identified a malicious Android app hosted...

Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

What happened A high-severity vulnerability in Hikvision wireless access points...

OpenClaw AI Agent Skills Abused to Conduct Credential Stuffing and Profile Hijacking

What happened Security researchers at VirusTotal have identified malicious use...

Share

What happened

A destructive malware family named DynoWiper has been observed used in targeted data-wiping attacks that erase victim systems. According to the report, Welivesecurity researchers analyzing the activity identified the malware’s behavior of iterating through files on a system and overwriting data with random content or null bytes, effectively destroying stored information. DynoWiper’s components appear to be modular, with separate loader and wiping routines that execute upon successful compromise. The malware was delivered through unknown initial access vectors and deployed against select victims; once executed, DynoWiper establishes persistence by writing its components to disk before initiating the wiping routines. The observed attacks were characterized by premeditated destructive intent rather than opportunistic exploitation, with victims’ systems left irrecoverably damaged after execution. Specific sectors or geographic focus were not disclosed in the report.

Who is affected

Organizations whose systems were targeted by DynoWiper are affected through irreversible data destruction caused by the malware’s overwriting routines following successful deployment by threat actors.

Why CISOs should care

The presence of destructive malware like DynoWiper demonstrates how threat campaigns can focus on data destruction and operational outage, posing risk to availability and system integrity beyond traditional theft or ransomware.

3 practical actions

  • Identify indicators of DynoWiper execution. Review logs and file system changes for signs of mass file overwrite patterns characteristic of the malware.
  • Ensure segmented backups are available. Maintain isolated backup copies that cannot be reached by destructive payloads to support recovery.
  • Monitor persistence mechanisms. Detect unauthorized installation of unknown loader components written to disk.