The Rising Threat of Wiper Malware in Geopolitical Cyber Conflicts

Summary:

A cyber incident affecting Stryker Corporation in March 2026 disrupted global operations after the Iran-linked hacktivist group Handala claimed responsibility for infiltrating the company’s network and initiating large-scale device resets through enterprise management platforms such as Microsoft Intune and Microsoft Entra ID. The incident highlights the growing threat posed by geopolitically motivated cyber operations targeting private-sector organizations operating in critical industries.

The event also emphasizes the importance of strengthening identity security, privileged access management, and endpoint administration controls. As organizations increasingly rely on centralized device management platforms and identity infrastructure, compromise of these systems can enable attackers to conduct large-scale, destructive operations capable of impacting thousands of devices simultaneously.

Technical Description:

Wiper malware represents a destructive category of cyber weapons designed to cause irreversible damage to targeted systems. These threats systematically overwrite files, corrupt critical boot structures such as the Master Boot Record (MBR), and destroy file system metadata including the Master File Table (MFT). By targeting these core disk components, wipers prevent systems from booting and eliminate the ability to recover stored data.

Unlike ransomware, which typically encrypts data to extort financial payment, wiper malware focuses on operational sabotage and data destruction. In some cases, attackers disguise wipers as pseudo-ransomware to mislead incident responders while destructive activities propagate across the network. Modern variants increasingly target enterprise environments, critical infrastructure, and Internet of Things devices by overwriting firmware or flash memory, making recovery impossible without restoring systems from isolated offline backups. The details and technicalities of the threat are discussed further

Delivery and Infection Chain:

Modern wiper malware campaigns increasingly rely on trusted administrative channels and supply chain compromise rather than traditional phishing attacks. Threat actors often target Managed Service Providers or compromise legitimate software update mechanisms, allowing malicious payloads to be delivered through channels that are normally trusted by enterprise security controls. Attackers also frequently employ Living-off-the-Land techniques that leverage native system tools such as PowerShell, Windows Management Instrumentation, and other built-in administrative utilities. These tools are used to download or execute the final destructive payload while blending malicious activity with normal system operations.

The lifecycle of a typical 2026 wiper attack follows several stages:

• Unlike earlier generations of wipers that triggered immediate destruction, modern variants such as DynoWiper may remain dormant within networks for extended periods while mapping infrastructure and identifying backup systems.
• Attackers move laterally across the environment using tools such as Mimikatz or by exploiting exposed remote access services like RDP or SSH to obtain Domain Administrator privileges.
• The wiper payload is distributed to multiple endpoints throughout the environment but remains inactive until triggered by a predefined logic-bomb timestamp or command-and-control signal.
• Once activated, the malware executes destructive payloads directly in memory using fileless techniques, reducing forensic evidence on disk and accelerating the wiping process.

Technical Capabilities:

Wiper malware is engineered specifically to destroy data and disrupt operations by corrupting file systems, boot processes, and storage devices. Unlike financially motivated malware families, the primary goal of wipers is operational sabotage rather than monetary gain. Technically, these threats may overwrite critical disk structures such as the Master Boot Record, Master File Table, or partition tables, effectively preventing systems from booting or accessing stored data.

More advanced variants may replace files with randomized data, delete shadow copies and backup snapshots, and disable endpoint protection services to maximize the destructive impact. Within enterprise environments, attackers may use administrative scripts, remote management utilities, or system-level privileges to simultaneously execute destructive commands across large numbers of endpoints.

Sophisticated campaigns also leverage identity compromise and centralized device management systems to amplify the scale of the attack. By gaining administrative access to identity platforms such as Microsoft Entra ID or endpoint management systems such as Microsoft Intune, attackers can distribute wipe commands, deploy malicious scripts, or initiate remote device resets across thousands of managed systems. Additional capabilities such as scheduled execution, propagation mechanisms, and log-clearing routines help attackers avoid detection while maximizing operational disruption.

Attribution and Evolution:

The activity has been attributed to Handala, a threat group that emerged in 2023 and is widely assessed by threat intelligence researchers to operate as a proxy actor aligned with Iran’s Ministry of Intelligence and Security. Although the group publicly presents itself as a hacktivist collective, its operational patterns, technical capabilities, and targeting behavior align with broader Iranian cyber strategy.

Initially associated with website defacements and public data leaks, the group has gradually expanded its activities to include destructive operations targeting corporate and critical infrastructure environments. This evolution reflects a broader shift in state-linked cyber operations, where proxy groups are used to conduct disruptive campaigns against private-sector organizations while maintaining plausible deniability for state sponsors.

Active Campaign and Geographic Spread:

Recent activity attributed to Handala suggests the presence of an active destructive campaign targeting organizations across multiple regions as part of geopolitically motivated cyber operations. Reports indicate that organizations in the United States, Israel, and other allied regions have experienced network intrusions followed by destructive actions such as endpoint wiping and server resets.

The incident involving Stryker Corporation illustrates the global impact such campaigns can generate. Because multinational enterprises operate interconnected infrastructure across multiple regions, disruptions initiated within a single environment can rapidly affect operations in dozens of countries. Employees across North America, Europe, and Asia reported disruptions following the incident, demonstrating how destructive cyber operations can propagate globally through centralized enterprise systems.

Conclusion:

The emergence of wiper malware in geopolitical cyber conflicts reflects a shift in the threat landscape toward destructive cyber operations designed to disrupt critical services rather than generate financial profit. By targeting core system components and bypassing traditional recovery mechanisms such as Volume Shadow Copies, attackers can create widespread operational disruption that is both difficult and expensive to remediate.

As identity platforms and centralized device management systems become increasingly integral to enterprise operations, their compromise can allow adversaries to conduct large-scale destructive actions across globally distributed environments.

Impact:

Wiper malware can produce severe operational and data loss consequences by permanently destroying critical system files, storage structures, and backup repositories. When deployed within enterprise environments, these attacks can render endpoints, servers, and entire networks inoperable, preventing access to essential applications and organizational data.

Beyond immediate system failure, wiper attacks can eliminate recovery points, bypass security monitoring tools, and propagate through interconnected systems. The resulting operational disruption can significantly impact business continuity, leading to long-term financial losses, reputational damage, and prolonged recovery efforts.

IOC and Context Details:

Topics Details
Tactic Name Impact & Defense Evasion
Technique Name Data Destruction
Sub Technique Name Disk Structure Wipe
Attack Type Malware
Targeted Applications SCADA/ICS Interfaces, Microsoft Intune, Active Directory, and FortiGate VPNs
Region Impacted Poland, Ukraine, Israel, and Global (USA, UAE, Australia)
Industry Impacted Energy, Utilities, Healthcare and Finance
IOC’s IP Addresses:
31.172.71.5
45.182.89.87
177.103.98.73
82.25.35[.]25
31.57.35[.]223
107.189.19[.]52
146.185.219[.]235
188.92.255.X
209.198.131.X
149.88.26.X
169.150.227.X

Domains:
aaabankruptcycenter.com
meganstallion.info
progamevl.ru

MD5:
cddfaa769d227e9b8c7d78be3169895d
5249503900c735425130477649872dfb
75fec5afb2deebab6dd9c16d9de35032
9d896e0e3e369c2edf1c8fb070f49c22
a727362416834fa63672b87820ff7f27
c4379da51e8b9e86ec3de934f9373f4a
f5271a6d909091527ed9f30eafa0ded6

SHA-1:
b719eff788239f59cec3f0ea4efab4aa5c8cfd28
4ec3c90846af6b79ee1a5188eefa3fd21f6d4cf6
410c8a57fe6e09edbfebaba7d5d3e4797ca80a19
472ca448f82a7ff6f373a32fdb9586fd7c38b631
4f8e9336a784a196353023133e0f8fa54f6a92e2
69ede7e341fd26fa0577692b601d80cb44778d93
86596a5c5b05a8bfbd14876de7404702f7d0d61b
9ec4c38394ea2048ca81d48b1bd66de48d8bd4e8

SHA-256:
64d940ed0cdcc62ff7ff0a00c57a486580309773dbf89b94a63339ce97c2792b
40a4b5e54fecce52c9d8ef5b2fa3973a3dd748c5bcedd7bde1154aa4a936c2e1
0f71fee52918f4e20de7d23a5ac793e1d45e4b4cd85366516732f1eaf63d254b
1c2c7042191523a03779fab3df14a4cb8f6dbdaf09d901233299ca2c67599145
40504bb12c4bc8d31be677ff574a735f1c64d573864197684b132c3db56a69d3
40a4b5e54fecce52c9d8ef5b2fa3973a3dd748c5bcedd7bde1154aa4a936c2e1
60c70cdcb1e998bffed2e6e7298e1ab6bb3d90df04e437486c04e77c411cae4b
648c2067ef3d59eb94b54c43e798707b030e0383b3651bcc6840dae41808d3a9
835b0d87ed2d49899ab6f9479cddb8b4e03f5aeb2365c50a51f9088dcede68d5
bfda142bc5c44913eed9ef1cf2a8ad07b7a71312a26e4c7c519bf1a3fedeb6a0
d1389a1ff652f8ca5576f10e9fa2bf8e8398699ddfc87ddd3e26adb201242160
128fa5815c6fee68463b18051c1a1ccdf28c599ce321691686b1efa4838a2acd
394a7ebad5dfc13d6c75945a61063470dc3b68f7a207613b79ef000e1990909b
448ad1bc06ea26f4709159f72ed70ca199ff2176182619afa03435d38cd53237
47bb36cd2832a18b5ae951cf5a7d44fba6d8f5dca0a372392d40f51d1fe1ac34
61c1c8fc8b268127751ac565ed4abd6bdab8d2d0f2ff6074291b2d54b0228842
772ceedbc2cacf7b16ae967de310350e42aa47e5cef19f4423220d41501d86a5
c7fc1f9c2bed748b50a599ee2fa609eb7c9ddaeb9cd16633ba0d10cf66891d8a
4744df6ac02ff0a3f9ad0bf47b15854bbebb73c936dd02f7c79293a2828406f6
5a826b4fa10891cf63aae832fc645ce680a483b915c608ca26cedbb173b1b80a
085256b114079911b64f5826165f85a28a2a4ddc2ce0d935fa8545651ce5ab09
edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9
19ab44a1343db19741b0e0b06bacce55990b6c8f789815daaf3476e0cc30ebea
ab5bf79274b6583a00be203256a4eacfa30a37bc889b5493da9456e2d5885c7f
f188abc33d351c2254d794b525c5a8b79ea78acd3050cd8d27d3ecfc568c2936
ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85
d934cb8d0eadb93f8a57a9b8853c5db218d5db78c16a35f374e413884d915016
edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9
3e27b6b287f0b9f7e85bfe18901d961110ae969d58b44af15b1d75be749022c2
28858cc6e05225f7d156d1c6a21ed11188777fa0a752cb7b56038d79a88627cc
be2fb06b0a61f72d901ea3d650912bb12ef94896528cca6f8f9466e49c1d0721
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998
02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f
18c92f23b646eb85d67a890296000212091f930b1fe9e92033f123be3581a90f
f07b0c79a8c88a5760847226af277cf34ab5508394a58820db4db5a8d0340fc7
2fc39463b6db44873c9c07724ac28b63cdd72f5863a4a7064883e3afdd141f8d
becb74a8a71a324c78625aa589e77631633d0f15af1473dfe34eca06e7ec6b86
2fc39463b6db44873c9c07724ac28b63cdd72f5863a4a7064883e3afdd141f8d
05aae309d7a8c562b3cf364a906b3fcb764c122855c7260697d96f83fc8ccee8
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
a259e9b0acf375a8bef8dbc27a8a1996ee02a56889cba07ef58c49185ab033ec
3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767
06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397
2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf
13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033
a294620543334a721a2ae8eaaf9680a0786f4b9a216d75b55cfd28f39e9430ea
b66b179eac03afafdc69f62c207819eceecfbf994c9efa464fda0d2ba44fe2d7
a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92
dcbbae5a1c61dbbbb7dcd6dc5dd1eb1169f5329958d38b58c3fd9384081c9b78
34ca75a8c190f20b8a7596afeb255f2228cb2467bd210b2637965b61ac7ea907
191ca4833351e2e82cb080a42c4848cfbc4b1f3e97250f2700eff4e97cf72019
24e9b86b92918c3731fa6126c70532c79507c8041b8e6bf1e1c007aa8a9ac025
6aa4081d4028116bb50315774f0d5dfd45dfb9b9f61f172cfa53bfc65eddf229
3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe
8dd8b9bd94de1e72f0c400c5f32dcefc114cc0a5bf14b74ba6edc19fd4aeb2a5
30b3cbe8817ed75d8221059e4be35d5624bd6b5dc921d4991a7adc4c3eb5de4a
d897f07ae6f42de8f35e2b05f5ef5733d7ec599d5e786d3225e66ca605a48f53
9b4dfaca873961174ba935fddaf696145afe7bbf5734509f95feb54f3584fd9a
CVE NA

Recommended Actions:

• Implement just-in-time access controls for administrative accounts to ensure elevated privileges are granted only when required and automatically revoked afterward.
• Deploy Privileged Identity Management and Privileged Access Management solutions to monitor, control, and secure administrative credentials.
• Maintain break-glass emergency accounts protected by hardware-based multi-factor authentication and isolated from normal administrative accounts.
• Enforce conditional access policies that restrict administrative sign-ins to trusted networks, corporate IP ranges, or approved managed devices.
• Harden endpoint and device management platforms such as Microsoft Intune by limiting administrator roles, monitoring high-risk administrative actions, and auditing remote command execution.
• Enable session token protection and reduce session lifetimes to limit the risk of credential theft and session hijacking.
• Maintain immutable and air-gapped backups of critical data and regularly test restoration procedures to ensure recovery capability following destructive attacks.
• Conduct continuous security awareness training, phishing simulations, and incident response exercises focused specifically on destructive malware scenarios.

Reference:

https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/