DynoWiper is a destructive malware associated with the 2025 Poland Wiper Attacks in December of 2025. DynoWiper is a native Windows binary that is distributed by a PowerShell script and overwrites files using data generated by the Mersenne Twister algorithm before they are deleted from the system. Multiple variants of DynoWiper have been identified, with the primary differences being that one variant shuts down the system after completing its destructive operations, and another introduces a time delay between file overwriting and deletion.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1485 | Data Destruction |
DynoWiper has overwritten files with 16-byte sequences of random data generated by the Mersenne Twister algorithm using the Microsoft Windows native |
|
| Enterprise | T1678 | Delay Execution |
DynoWiper has utilized a five-second delay using |
|
| Enterprise | T1083 | File and Directory Discovery |
DynoWiper has used the Microsoft Windows native |
|
| Enterprise | T1680 | Local Storage Discovery |
DynoWiper has used the Microsoft Windows native |
|
| Enterprise | T1036 | Masquerading |
DynoWiper has been named after well-known files schtask.exe, schtask2.exe, and |
|
| Enterprise | T1106 | Native API |
DynoWiper has used multiple native Windows functions, such as |
|
| Enterprise | T1120 | Peripheral Device Discovery |
DynoWiper has enumerated and overwritten files on all removeable and fixed drives.[3] |
|
| Enterprise | T1679 | Selective Exclusion |
DynoWiper has recursively enumerated directories with the exception of the following: System32, Windows, Program Files, Program Files(x86), Temp, Recycle.Bin, $Recycle.Bin, Boot, PerfLogs, AppData, Documents and Settings.[1][2] |
|
| Enterprise | T1529 | System Shutdown/Reboot |
DynoWiper has used the Microsoft Windows native |
|
| ID | Name | Description |
|---|---|---|
| C0063 | 2025 Poland Wiper Attacks |
DynoWiper was used for destructive attacks during the 2025 Poland Wiper Attacks.[1][3] |