Company
Date Published
Author
Microsoft
Word count
2911
Language
English
Hacker News points
None

Summary

CrowdStrike's blog post delves into the intricacies of wiper malware, specifically focusing on how threat actors exploit legitimate third-party kernel drivers to execute malicious activities. These drivers, such as ElRawDisk and EPMNTDRV, enable wipers to operate covertly by bypassing security mechanisms and gaining unrestricted access to disk operations. This method allows malware to destabilize operating systems by wiping raw disk sectors, though it paradoxically offers a slight advantage to victims since system crashes may halt the wiping process, potentially enabling some data recovery. The article highlights several wiper families, including Shamoon, Destover, and ZeroCleare, which utilize these drivers to achieve their destructive objectives. CrowdStrike's Falcon platform is presented as a robust defense, providing continuous monitoring and visibility to counteract such threats effectively.