Wiper Malware Compromises SEMARNAT
By Tomás Lujambio | Journalist & Industry Analyst -
Tue, 09/05/2023 - 16:55
On September 1st, the Mexican Ministry of Environment and Natural Resources (SEMARNAT) fell victim to a severe wiper cyberattack looking to compromise the institution’s confidential information. Upon detecting this cyberthreat, SEMARNAT's IT experts took swift action by promptly shutting down all the organization's computers to stop the malware from propagating from within.
“The agency's computer systems received a warning regarding the presence of an executable file associated with the Azov ransomware, one of the most aggressive and fast-acting wipers currently in use. Once installed, the malware spreads throughout the digital infrastructure within minutes and encrypts the system's documents," said Víctor Ruíz, CEO and Founder, Silikn.
Government ministries are heavily targeted by cybercriminals due to the sensitive data that they store and their willingness to pay ransoms. However, the success of such attacks can have far-reaching consequences, extending to infrastructure control systems. Such attacks can disrupt the operation of vital environmental facilities, including water treatment plants and waste management systems, potentially leading to environmental disasters.
Currently, it is believed that the breach at SEMARNAT was intended to access sensitive information related to hazardous waste management routes, environmental impact authorizations and official licenses issued by the agency. Moreover, the malware incursion may entail significant financial costs tied to remediation and recovery efforts, along with potential legal ramifications for failing to safeguard government data.
"It [i]s crucial to emphasize that this malware not only encrypts documents and data but also destroys them irreversibly, with the sole backup resting in the hands of the digital criminals," Ruiz explained. While cybercriminals often appear to be motivated by financial gain, recent evidence suggests a profound agenda at play.
According to Ruiz, the cybercriminal group responsible for SEMARNAT's breach has been identified as APT Agrius, which is suspected to have affiliations with the Iranian government. However, “this information does not discard the possibility that these cyberthreats were carried out by Russian cyber[crime] groups such as LockBit or BlackByte,” added Ruiz.
To mitigate such risks, environmental ministries must prioritize cybersecurity by implementing robust measures. These measures should encompass network security, employee training, incident response plans and continuous system monitoring. SEMARNAT has not yet officially acknowledged the cyberattack or disclosed a potential response protocol, raising concerns about their readiness to confront future threats.
Ultimately, the SEMARNAT incident proves that it is imperative that public and private sectors collaborate closely in order to fortify the country’s cybersecurity defenses, share intelligence and resources to stop malicious actors effectively. Such a proactive approach would not only protect Mexico's digital assets but also ensure the continued safety and stability of its environmental and governmental systems in an increasingly interconnected world.








