{"id":11230,"date":"2022-02-28T17:32:19","date_gmt":"2022-02-28T16:32:19","guid":{"rendered":"https:\/\/www.show.it\/cisa-fbi-issue-warnings-on-whispergate-hermeticwiper-attacks\/"},"modified":"2022-02-28T17:32:19","modified_gmt":"2022-02-28T16:32:19","slug":"cisa-fbi-issue-warnings-on-whispergate-hermeticwiper-attacks","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/cisa-fbi-issue-warnings-on-whispergate-hermeticwiper-attacks\/","title":{"rendered":"CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks"},"content":{"rendered":"<p><span><strong><span>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released indicators of compromise to help threat hunters look for signs of WhisperGate and HermeticWiper, two destructive malware files seen in recent attacks against organizations in Ukraine.<\/span><\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/cisa-fbi-issue-warnings-whispergate-hermeticwiper-attacks\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LyPFR4Yuvs4:4yjomKJ6kho:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LyPFR4Yuvs4:4yjomKJ6kho:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LyPFR4Yuvs4:4yjomKJ6kho:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=LyPFR4Yuvs4:4yjomKJ6kho:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=LyPFR4Yuvs4:4yjomKJ6kho:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released indicators of compromise to help threat hunters look for signs of WhisperGate and HermeticWiper, two destructive malware files seen in recent attacks against organizations in Ukraine. read more<\/p>\n","protected":false},"author":2,"featured_media":11231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,13,20,28,25,14,10,30,31,15,21,34,11,17,18,19,23],"tags":[],"class_list":["post-11230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-security","category-audits","category-cloud-security","category-cyberwarfare","category-data-protection","category-email-security","category-endpoint-security","category-fraud-identity-theft","category-identity-access","category-incident-response","category-malware","category-network-security","category-news-industry","category-phishing","category-risk-management","category-virus-malware","category-vulnerabilities"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=11230"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/11231"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=11230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=11230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=11230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}