Page 106 - Cyber Defense eMagazine September 2025
P. 106

Wiper  Malware:  What  Federal,  State  and  Local  Agencies

            Must Know to Protect Mission-critical Systems



            By Dirk Schrader, VP of Security Research and Field CISO EMEA, Netwrix


            When malicious code is engineered not for ransom but for ruin, the very continuity of government is at
            stake. Wiper malware has emerged as a favored weapon of nation-state actors and hacktivists intent on
            erasing data, disrupting essential services, and undermining public trust. From the NotPetya outbreak
            that crippled ministries in Ukraine to the Shamoon campaign that paralyzed regional energy agencies,
            recent incidents show how quickly a single destructive payload can ripple through the networks that power
            citizen services, defense operations, and critical infrastructure. Understanding how wipers work – and
            how to stop them before they detonate – is now a core mandate for every agency CISO and IT security
            leader.



            Understanding the Nature of Wiper Malware

            Wiper malware is increasingly being used in cyberwarfare, hacktivism and politically motivated attacks.
            One  of  the  most  vivid  examples  is  the  NotPetya  attack  in  2017,  which  impacted  businesses  and
            government agencies worldwide and caused an estimated $10 billion in total damages. Interestingly,





            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          106
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   101   102   103   104   105   106   107   108   109   110   111