

Researchers say they’ve uncovered never-before-seen disk-wiping malware that’s disguising itself as ransomware because it unleashes harmful assaults on Israeli targets.
Apostle, as researchers at safety agency SentinelOne are calling the malware, was initially deployed in an try to wipe knowledge however failed to take action, seemingly due to a logic flaw in its code. The inner identify its builders gave it was “wiper-action.” In a later model, the bug was fastened and the malware gained full-fledged ransomware behaviors, together with the power to go away notes demanding that victims pay a ransom in change for a decryption key.
A transparent line
In a post published Tuesday, SentinelOne researchers stated they assessed with excessive confidence that based mostly on the code and the servers Apostle reported to, the malware was being utilized by a newly found group with ties to the Iranian authorities. While a ransomware word the researchers recovered instructed that Apostle had been used towards a essential facility within the United Arab Emirates, the first goal was Israel.
“The usage of ransomware as a disruptive tool is usually hard to prove, as it is difficult to determine a threat actor’s intentions,” Tuesday’s report said. “Analysis of the Apostle malware provides a rare insight into those kinds of attacks, drawing a clear line between what began as a wiper malware to a fully operational ransomware.”
The researchers have dubbed the brand new hacking group Agrius. SentinelOne noticed the group first utilizing Apostle as a disk wiper, though a flaw within the malware prevented it from doing so, almost definitely due to a logic error in its code. Agrius then fell again on Deadwood, a wiper that had already been used towards a goal in Saudi Arabia in 2019.
Agrius’ new model of Apostle is full-fledged ransomware.
“We believe the implementation of the encryption functionality is there to mask its actual intention—destroying victim data,” Tuesday’s publish said. “This thesis is supported by an early version of Apostle that the attackers internally named ‘wiper-action.’”
Apostle has main code overlap with a backdoor, known as IPSec Helper, that Agrius additionally makes use of. IPSec Helper receives a number of instructions, comparable to downloading and executing an executable file, which are issued from the attacker’s management server. Both Apostle and IPSec Helper are written within the .Net language.
Agrius additionally makes use of webshells in order that attackers can transfer laterally inside a compromised community. To conceal their IP addresses, members use the ProtonVPN.
An affinity for wipers
Iranian-sponsored hackers already had an affinity for disk wipers. In 2012, self-replicating malware tore via the community of Saudi Arabia-based Saudi Aramco, the world’s largest crude exporter, and permanently destroyed the hard drives of greater than 30,000 workstations. Researchers later recognized the wiper worm as Shamoon and stated it was the work of Iran.
In 2016, Shamoon reappeared in a marketing campaign that struck at a number of organizations in Saudi Arabia, together with a number of authorities businesses. Three years later, researchers uncovered a new Iranian wiper called ZeroCleare.
Apostle isn’t the primary wiper to be disguised as ransomware. NotPetya, the worm that inflicted billions of dollars of damage worldwide, additionally masqueraded as ransomware till researchers decided that it was created by Russian government-backed hackers to destabilize Ukraine.
SentinelOne Principal Threat Researcher Juan Andres Guerrero-Saade stated in an interview that malware like Apostle illustrates the interaction that always happens between financially motivated cybercriminals and nation-state hackers.
“The threat ecosystem keeps evolving, with attackers developing different techniques to achieve their goals,” he stated. “We see cybercriminal gangs learning from the better resourced nation-state groups. Likewise, the nation-state groups are borrowing from criminal gangs—masquerading their disruptive attacks under the guise of ransomware with no indication as to whether victims will in fact get their files back in exchange for a ransom.”