Page 106 - Cyber Defense eMagazine September 2025
P. 106
Wiper Malware: What Federal, State and Local Agencies
Must Know to Protect Mission-critical Systems
By Dirk Schrader, VP of Security Research and Field CISO EMEA, Netwrix
When malicious code is engineered not for ransom but for ruin, the very continuity of government is at
stake. Wiper malware has emerged as a favored weapon of nation-state actors and hacktivists intent on
erasing data, disrupting essential services, and undermining public trust. From the NotPetya outbreak
that crippled ministries in Ukraine to the Shamoon campaign that paralyzed regional energy agencies,
recent incidents show how quickly a single destructive payload can ripple through the networks that power
citizen services, defense operations, and critical infrastructure. Understanding how wipers work – and
how to stop them before they detonate – is now a core mandate for every agency CISO and IT security
leader.
Understanding the Nature of Wiper Malware
Wiper malware is increasingly being used in cyberwarfare, hacktivism and politically motivated attacks.
One of the most vivid examples is the NotPetya attack in 2017, which impacted businesses and
government agencies worldwide and caused an estimated $10 billion in total damages. Interestingly,
Cyber Defense eMagazine – September 2025 Edition 106
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.