SecurityJoes first reported a Linux wiper named BiBi-Linux Wiper used by pro-Hamas hacktivists. BlackBerry later identified a Windows variant, BiBi-Windows Wiper, signaling the threat is expanding to Windows end-user machines. #BiBiLinuxWiper #BiBiWindowsWiper #Hamas #Israel #ShadowCopy #RestartManager
Keypoints
- BiBi-Linux Wiper was reported by SecurityJoes; a Windows variant (BiBi-Windows Wiper) was subsequently identified by BlackBerry.
- The attack appears data-destructive with no ransom note and no C2 infrastructure described.
-
MITRE Techniques
- [T1082] System Information Discovery – The malware, once executed, checks the processor architecture and the number of threads in the intended victim’s system. “The infection vector is currently unknown, once the implant is executed, it checks the processor architecture and the number of threads in the intended victim’s system.”
- [T1059.003] Command-Line Interface – It executes Windows commands via the CMD shell, e.g., “cmd.exe /c vssadmin delete shadows /quiet /all” with Right-to-Left storage to evade detection. “All CMD commands in the code are stored with a right-to-left technique to bypass simple pattern detection rules typically used by legacy antivirus products.”
- [T1027] Obfuscated/Compressed Files and Information – The code stores CMD commands using a right-to-left technique to defeat detectors. “All CMD commands in the code are stored with a right-to-left technique to bypass simple pattern detection rules typically used by legacy antivirus products.”
- [T1490] Inhibit System Recovery – The malware disables system recovery features to hinder restoration: “disables the system’s trigger to call the Error Recovery screen on startup” and “turns off the Windows Recovery feature so the system may not be recovered.”
- [T1485] Data Destruction – The wiper destroys files by overwriting them with random bytes and renaming them, effectively deleting data: “The sample destroys all files … The wiping process is performed so the targeted files are filled out with random bytes, essentially rendering the file unusable—and unrecoverable.”
Indicators of Compromise
- [File Name] BiBi Windows Wiper sample – bibi.exe
- [SHA256] BiBi Windows Wiper sample – 40417e937cd244b2f928150cae6fa0eff5551fdb401ea072f6ecdda67a747e17
- [MD5] BiBi Windows Wiper sample – e26bba0304f14ef96beb60376791d32c
- [File Size] BiBi Windows Wiper sample – 203.00 KB (207872 bytes)
Read more: https://blogs.blackberry.com/en/2023/11/bibi-wiper-used-in-the-israel-hamas-war-now-runs-on-windows