Bibi

Malware updated 3 months ago (2024-11-29T13:52:47.686Z)
Download STIX
Preview STIX
BiBi is a harmful malware designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This type of malicious software presents a significant threat to digital security and privacy. The Pro-Hamas hacktivist group has been identified as the perpetrator behind the BiBi malware attacks. The group specifically targeted Israel with a variant of this malware known as the BiBi-Linux wiper. This particular strain of the malware appears to be designed to wipe Linux-based systems, causing extensive damage and disruption. The attack was reported by Security Affairs, highlighting the increasing trend of politically motivated cyberattacks. These attacks not only compromise national security but also have far-reaching implications for individuals and businesses alike. As such, it underscores the importance of robust cybersecurity measures and practices in order to mitigate such threats.
Description last updated: 2024-08-14T08:50:50.121Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Bibi Wiper is a possible alias for Bibi. The BiBi wiper is a custom malware developed and utilized by the cyber threat group, Void Manticore. This malicious software, named after Israeli Prime Minister Benjamin Netanyahu's nickname "BiBi," is used to disrupt computer operations, exfiltrate email data, and in some instances, hold data for r
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Linux
Wiper
Malware
Ransom
Windows
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Bibi Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
6 months ago
Securityaffairs
6 months ago
Securityaffairs
7 months ago
Securityaffairs
7 months ago
Securityaffairs
7 months ago
Securityaffairs
7 months ago
Securityaffairs
8 months ago
Securityaffairs
8 months ago
Securityaffairs
8 months ago
Securityaffairs
9 months ago
Checkpoint
9 months ago
Securityaffairs
9 months ago
Securityaffairs
10 months ago
Securityaffairs
10 months ago
Securityaffairs
10 months ago
Securityaffairs
a year ago
Securityaffairs
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago