WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Coronavirus-Themed Destructive Wiper Malware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Coronavirus-Themed Destructive Wiper Malware

Author: Jennifer Walker

Created: Thursday, April 2, 2020 - 16:34

Categories: Cybersecurity

Malicious actors are leaving no technique unturned as they continue to predictably use every conceivable method to wage their coronavirus-themed attack campaigns. While the ploys are the same, the deluge of themed attacks is unprecedented. Therefore, it should come as no surprise that malware authors would eventually develop successful disk wiping malware designed around a coronavirus theme.

Thus far, there have reportedly been two COVID-themed malware samples observed successfully overwriting the MBR (master boot record) rendering devices unusable. On March 12, BleepingComputer reported on a Kpot Infostealer that was masquerading as CoronaVirus Ransomware which ultimately overwrote the MBR after stealing user credentials. The tactic was similar to the NotPetya campaign in 2017 where users were presented with a ransom note, but with no instructions or ability to view the note again after the computer rebooted and the MBR was overwritten; the ransomware was just a façade. This week, researchers from cybersecurity firm SonicWall reported on a trojan sample called “coronavirus” that simply overwrites the MBR. There is no façade; once a device is infected with the “coronavirus” trojan, the malware displays a window with the coronavirus image that states “coronavirus has infected your PC!” while the malware continues working in the background to overwrite the MBR. Once the MBR has been overwritten, upon reboot the computer returns a grey screen that displays “Your Computer Has Been Trashed.”

Disk wiping, or overwriting the MBR is a technique commonly seen with advanced threat actors, as it takes a higher-degree of technical knowledge to futz with the master boot record. Likewise, as state-sponsored actors have been observed jumping on the coronavirus-themed malware lure bandwagon, this technique is something more in their wheelhouse than the work of common cybercriminals. More information on disk wiping, including threat groups observed using it, can be found in the MITRE ATT&CK Disk Structure Wipe technique.

At present there is reportedly no fix, patch, or inoculation for the “coronavirus” trojan. The best defense is a good data backup along with effective restoration procedures. Read more at ZDNet

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar