Bibi

Malware updated 25 days ago (2024-08-14T10:04:32.740Z)
Download STIX
Preview STIX
BiBi is a harmful malware designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This type of malicious software presents a significant threat to digital security and privacy. The Pro-Hamas hacktivist group has been identified as the perpetrator behind the BiBi malware attacks. The group specifically targeted Israel with a variant of this malware known as the BiBi-Linux wiper. This particular strain of the malware appears to be designed to wipe Linux-based systems, causing extensive damage and disruption. The attack was reported by Security Affairs, highlighting the increasing trend of politically motivated cyberattacks. These attacks not only compromise national security but also have far-reaching implications for individuals and businesses alike. As such, it underscores the importance of robust cybersecurity measures and practices in order to mitigate such threats.
Description last updated: 2024-08-14T08:50:50.121Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Bibi Wiper
2
The BiBi wiper is a malicious software (malware) utilized by the hacking group Void Manticore, with its name referencing the nickname of Israel's Prime Minister, Benjamin Netanyahu. The malware was first reported in late 2023 during attacks against Albania, where it was used to wipe data from comput
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Linux
Wiper
Malware
Ransom
Windows
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Bibi Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
a month ago
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 6
Securityaffairs
a month ago
security-affairs-malware-newsletter-round-5
Securityaffairs
2 months ago
Security Affairs Malware Newsletter - Round 3
Securityaffairs
2 months ago
Security Affairs Malware Newsletter - Round 3
Securityaffairs
2 months ago
Security Affairs Malware Newsletter - Round 2
Securityaffairs
2 months ago
Security Affairs Malware Newsletter - Round 1
Securityaffairs
2 months ago
Security Affairs newsletter Round 478 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 477 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 476 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
3 months ago
Security Affairs newsletter Round 473 by Pierluigi Paganini – INTERNATIONAL EDITION
Checkpoint
4 months ago
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel - Check Point Research
Securityaffairs
4 months ago
Security Affairs newsletter Round 470 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
4 months ago
Security Affairs newsletter Round 469 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
5 months ago
Security Affairs newsletter Round 467 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
5 months ago
Security Affairs newsletter Round 466 by Pierluigi Paganini
Securityaffairs
5 months ago
Security Affairs newsletter Round 465 by Pierluigi Paganini
Securityaffairs
5 months ago
Security Affairs newsletter Round 464 by Pierluigi Paganini
Securityaffairs
6 months ago
Security Affairs newsletter Round 463 by Pierluigi Paganini
CERT-EU
6 months ago
Phone hacking has become too easy, PTA chief tells IHC - Pakistan | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Securityaffairs
6 months ago
Security Affairs newsletter Round 462 by Pierluigi Paganini