Thursday, April 10, 2025
HomeCyber Security NewsCryWiper Malware Masquerades as Ransomware & Purposely Destroys Data

CryWiper Malware Masquerades as Ransomware & Purposely Destroys Data

Published on

SIEM as a Service

Follow Us on Google News

CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this ransomware completely destroys the data it infects instead of encrypting it. 

While during an attack against the Russian mayor’s offices and courts as reported by Russian media, this scenario was detected.

This fall, Kaspersky was the first company to discover CryWiper and they later reported the malware was used to attack a Russian organization in an attack carried out by the operators of the malware.

- Advertisement - Google News

Technical Analysis

Upon close inspection and analysis of the source code of CryWiper, it becomes clear that its ability to wipe targets’ data is completely intentional, so it’s not a mistake.

CryWiper is primarily written in C++ and it’s a Windows executable that is based on 64-bit architecture. As a result of its configuration, CryWiper abuses numerous WinAPI functions and it remains hidden under the following name:-

  • browserupdate.exe

As soon as the malware is executed on the system that’s already compromised, it automatically creates a list of tasks scheduled to run at an interval of every five minutes.

This Trojan then uses an HTTP GET request to contact its command and control server (C2), passing the name of the system that is infected as a parameter to the server in order to gain access to the compromised system.

The following strings are sent by the C&C server in order to control the behavior and attributes of the malware:-

  • run
  • do not run

CryWiper will then immediately begin its malicious activity if the ‘run’ option has been returned. In an effort to trick the victims, in some cases, the complete execution delays are extended up to 4 days which is around 345,600 seconds.

Moreover, to destroy the data CryWiper has to free the locked data, and to do so, it stops all the processes that are marked as critical and these processes are related to:-

  • MySQL
  • MS SQL database servers
  • MS Exchange email servers
  • MS Active Directory web services

As a result of CryWiper, the Windows Registry is also modified so that RDP connections are prevented, thereby making remote IT specialists unable to intervene and respond when an incident occurs.

Ignored File Extensions & Directories

Here below we have mentioned all the file types that are not destroyed by CryWiper:-

  • .exe
  • .dll
  • .lnk
  • .sys
  • .msi
  • .CRY

Additionally, the following directories are also skipped by CryWiper, resulting in the complete loss of functionality:-

  • C:\Windows
  • tmp
  • winnt
  • temp
  • thumb
  • System Volume Information
  • Boot
  • Windows
  • Trend Micro

A pseudorandom number generator that is known as ‘Mersenne Twister’ is used as the algorithm for corrupting the files. 

Once this is accomplished, a ransom note, which will be titled ‘README.txt’, will be generated by CryWiper. In this note, it asks for 0.5 Bitcoin which is about $8,000 in exchange for a decrypter in order to be released.

The CryWiper malware is not a ransomware file in the traditional manner, but it is a malware program that is capable of destroying a large amount of data in a short period of time.

Recommendations

Here below we have mentioned all the recommendations advised by the security experts:-

  • Make sure to perform behavioral file analysis to detect and block malware.
  • There are various MDR and SOC services that can detect intrusions in a timely manner and respond accordingly to these intrusions.
  • Blocking malicious files and URLs from email attachments based on dynamic analysis must be done.
  • Performing penetration tests on a regular basis and participating in RedTeam projects as necessary.
  • In order to keep up with threats, it is necessary to monitor threat data.

Penetration Testing As a Service – Download Red Team & Blue Team Workspace

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers,...

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers,...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave...