30 July 2021

New destructive wiper malware linked to recent Iranian railway attack


New destructive wiper malware linked to recent Iranian railway attack

It appears that the destructive cyberattack against Iranian train system that took place earlier this month was caused by a previously undocumented wiper malware.

Following the reports about the incident, security researchers with SentinelOne conducted their own investigation and discovered a destructive wiper component, which they dubbed ‘Meteor’, capable of deleting data on the infected systems.

According to SentinelOne threat hunter Juan Andres Guerrero-Saade, this is the first known case where this wiper was deployed. He said that it was developed in the past three years and appears designed for reuse in multiple campaigns.

The attack, named ‘MeteorExpress’, involved a toolkit of batch files and executables to wipe a system, lock the device's Master Boot Record (MBR), and install a screen locker. The Meteor wiper was just a part of the toolkit used in the attack, along with two other components – a file named mssetup.exe used to lock the user out of their PC, and nti.exe used for corrupting the victim computer’s master boot record (MBR).

In addition to wiping files, Meteor deletes shadow copies and removes the machine from the domain to avoid means of quick remediation. It also comes with additional functionality, such as the ability to change passwords for all users, disable screen servers, terminate processes, creating processes and execute commands, etc., although in the observed attack most of functionality was not used, the researchers said.

“We cannot yet make out the shape of this adversary across the fog. Perhaps it’s an unscrupulous mercenary group. Or the latent effects of external training coming to bear on a region’s nascent operators. At this time, any form of attribution is pure speculation and threatens to oversimplify a raging conflict between multiple countries with vested interests, means, and motive,” Guerrero-Saade noted.


Back to the list

Latest Posts

Free VPN apps on Google Play turned Android devices into residential proxies

Free VPN apps on Google Play turned Android devices into residential proxies

The threat actor behind this scheme profits by selling access to the residential proxy network to third parties.
28 March 2024
Cyber spies strike Indian government and energy sectors

Cyber spies strike Indian government and energy sectors

The operation involved phishing emails delivering the HackBrowserData info-stealer.
28 March 2024
Spyware makers and state-backed hackers are primary culprits behind rise in zero-day exploits, Google says

Spyware makers and state-backed hackers are primary culprits behind rise in zero-day exploits, Google says

97 zero-day flaws were exploited in-the-wild in 2023, marking an increase of over 50% compared to 2022.
27 March 2024