Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Iran-Linked ZeroCleare Wiper Targets Energy, Industrial Sectors in Middle East

Researchers at IBM X-Force have come across what appears to be a new piece of malware that has been used in highly targeted attacks aimed at energy and industrial organizations in the Middle East.

Researchers at IBM X-Force have come across what appears to be a new piece of malware that has been used in highly targeted attacks aimed at energy and industrial organizations in the Middle East.

Dubbed ZeroCleare based on a path in its binary file, the malware has been described by IBM as a destructive wiper and it has been linked to Iranian hacker groups. The company believes this may be a recently created piece of malware and the campaign its researchers analyzed may have been the first to use ZeroCleare.

ZeroCleare is similar to the notorious Shamoon malware and it’s designed to overwrite the master boot record (MBR) and disk partitions of devices running Windows. Similar to Shamoon, ZeroCleare relies on the legitimate EldoS RawDisk tool to achieve its goal.

Also similar to Shamoon, this new piece of malware had spread to many devices on the network of the targeted organizations, enabling the attackers to cause serious damage. Despite these similarities, IBM believes there are enough significant differences to view ZeroCleare as a separate malware family.

The company’s analysis of the malware revealed that ZeroCleare was likely the work of at least two Iran-based threat groups, including OilRig (aka APT34 and ITG13) and Elfin (aka APT33 and Hive0016).

According to IBM, ZeroCleare can target both 32-bit and 64-bit Windows systems. In the case of 64-bit systems, which prevent the execution of drivers that are not signed by Microsoft, the malware relies on an intentionally vulnerable driver that is signed by Microsoft, which in turn loads the unsigned EldoS RawDisk driver, which is needed to wipe the machine.

The attack was linked to Iran partly based on the use of infrastructure previously used by groups believed to be operating out of Iran. It was reported recently that the infrastructure set up by one of these Iranian groups was hijacked by the Russia-linked threat actor known as Turla, but IBM does not believe that the Russian group was behind the ZeroCleare attacks.

“Looking at the geographical region hit by the ZeroCleare malware, it is not the first time the Middle East has seen destructive attacks target its energy sector. In addition to underpinning the economies of several Gulf nations, the Middle Eastern petrochemical market, for example, hosts approximately 64.5 percent of the world’s proven oil reserves, according to OPEC, making it a vital center of global energy architecture. Destructive cyberattacks against energy infrastructure in this arena, therefore, represent a high-impact threat to both regional and international markets,” explained Limor Kessem, executive security advisor at IBM.

Advertisement. Scroll to continue reading.

Related: ‘xHunt’ Campaign Targets Kuwait Transportation and Shipping Sector

Related: Iranian Hackers Use New Malware in Recent Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

Cloud security firm Mitiga has appointed Charlie Thomas as Chief Executive Officer.

Cynet announced the appointment of Jason Magee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.