Analysis and Mitigations of Wiper Malware Variants Used Against Ukraine

Logo
Presented by

Lindsay Kaye (Director, Operational Outcomes), Cory Nance (Senior Security Researcher)- Recorded Future Insikt Group

About this talk

The ongoing Ukraine War has involved components across all threat dimensions including physical conflict, disinformation, supply chain disruptions, and of course, cyber. Leading up to and throughout the war, several destructive cyber attacks launched against various entities, bringing the conflict to cyberspace and increasing the uncertainty of whether the Wiper malware variants could affect networks and companies outside of Ukraine by way of spillover. To understand the malware variants used for these attacks, their effects, and mitigation strategies, join threat intelligence analysts from Recorded Future's research arm, Insikt Group for a discussion providing a high-level comparative overview of the 9 known wiper variants associated with the ongoing Ukraine War. This webinar will provide insight into the similarities and differences between the tools, the implications at a geopolitical level, and mitigation considerations in the event of spillover. You will leave this webinar with: • An understanding of what Wiper malware is and how it’s used • A detailed comparison of the 9 Wiper malware variants used against Ukraine • Mitigation considerations in the event of spillover attacks
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (72)
Subscribers (4045)
Recorded Future delivers meaningful results for our clients. Whether it’s improving efficiency for research and triage, slashing time to threat detection, or improving your organization’s bottom line, we are dedicated to saving our clients time and money — in addition to measurably reducing risk. We believe that intelligence is the key to unlocking the potential of security programs – and protecting our organizations and communities. We believe that security solutions should do just that: be solutions – helping to solve big problems and reduce risk. We know that the right intelligence, in the hands of the right people, at the right time, stops attackers in their tracks.