-
haneen
at May 05,2016
First of all, for example, if the company that was under attack by shannon had it's backup plan, the damage won't be that big.
Secondly, if it was created because of political reasons, I don't think that political agencies will allow weak people to work inside, so it's not going to be an attak caused from inside ( for this situation).
Finally, if its going to be executed from outside then as he said, it's going to need some information to get into the network, and some credentials.
It is a good tool, but not the best.
-
pdonyina
at May 06,2016
The people who write viruses shifted their intentions from notoriety to profit. Since then, most viruses have been designed to remain undetected and unobtrusive
-
pdonyina
at May 06,2016
Computer forensic experts who have inspected the Shamoon code have stated that Shamoon was not an especially difficult virus to create, so copycat viruses are quite possible
-
pdonyina
at May 06,2016
nice!! It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable
-
pdonyina
at May 06,2016
The attack replaces the deleted files with JPEG images - obstructing any potential file recovery by the victim. This is bad