PathWiper Malware Targets Ukraine’s Digital Backbone
Table of Contents
One More Digital Threat Surfaces
Another discovered piece of malware, dubbed PathWiper, has been identified in a cyberattack against critical infrastructure in Ukraine. Security researchers revealed that this destructive software was deployed through a legitimate endpoint administration platform—suggesting that attackers had full control over the system's management console. This level of access allowed for seamless and widespread deployment of the malware across multiple devices within the target network.
What Is PathWiper?
PathWiper is a form of "wiper" malware—a class of malicious software designed to irreversibly destroy data on infected systems. Once executed, PathWiper scans all connected storage devices on a system, including physical drives, shared and unshared network volumes, and removable media. It then initiates multiple threads to attack each discovered volume simultaneously, replacing data with randomly generated bytes, rendering the data permanently unrecoverable.
Advanced Destruction Tactics
Unlike typical malware that may aim to steal information or hold systems hostage, PathWiper is purely destructive. It programmatically identifies all storage paths and directly targets critical file system components such as the Master Boot Record (MBR) and key NTFS artifacts like $MFT, $LogFile, and $Bitmap. Before overwriting, it attempts to dismount the volume to ensure the destruction is clean and complete. This targeted approach makes recovery efforts significantly more difficult.
Traces of an Experienced Adversary
The tactics and coding style behind PathWiper strongly resemble those of previously identified malware linked to Russian-backed cyber operations. Specifically, experts point to similarities with HermeticWiper, a 2022 malware also used against Ukrainian systems. However, unlike HermeticWiper, which used a more basic method to locate and corrupt drives, PathWiper performs more precise scans and employs a more sophisticated system for confirming drive identities before initiating destruction.
Why This Matters
The emergence of PathWiper highlights a growing trend in cyber warfare: the use of destructive tools designed not for espionage but to cause operational paralysis. For Ukraine, whose critical infrastructure has already been under strain due to prolonged conflict, such attacks present significant risks to the stability and continuity of essential services. The malware's ability to wipe systems with surgical accuracy raises alarms about the evolving nature of digital threats to national infrastructure.
Implications Beyond Ukraine
While this incident occurred within Ukraine, the methods used in the attack reveal vulnerabilities that could be exploited in other nations and sectors. The use of a legitimate management tool to deploy the malware underscores a broader issue: once attackers gain access to administrative tools, even trusted platforms can become vectors for large-scale sabotage. This raises urgent questions about endpoint security, access control, and the need for continuous monitoring within critical systems.
A Glimpse Into the Future of Cyber Threats
The growing sophistication of wiper malware like PathWiper represents a shift in the cybersecurity landscape. Instead of operating under the radar, these tools are meant to make an impact—fast and irreversibly. This attack shows that even in a prolonged conflict like the one in Ukraine, cyber warfare continues to evolve, with adversaries deploying increasingly refined weapons to disrupt and damage at scale.
Bottom Line
For organizations worldwide, the discovery of PathWiper serves as a warning to bolster defenses. This includes tighter control over administrative access, routine checks of endpoint integrity, and the deployment of early detection systems capable of recognizing abnormal behavior. Ensuring that backups are isolated and secure is also critical.







