haneenat May 05,2016 First of all, for example, if the company that was under attack by shannon had it's backup plan, the damage won't be that big.
Secondly, if it was created because of political reasons, I don't think that political agencies will allow weak people to work inside, so it's not going to be an attak caused from inside ( for this situation).
Finally, if its going to be executed from outside then as he said, it's going to need some information to get into the network, and some credentials.
It is a good tool, but not the best.
pdonyinaat May 06,2016 The people who write viruses shifted their intentions from notoriety to profit. Since then, most viruses have been designed to remain undetected and unobtrusive
pdonyinaat May 06,2016 Computer forensic experts who have inspected the Shamoon code have stated that Shamoon was not an especially difficult virus to create, so copycat viruses are quite possible
pdonyinaat May 06,2016 nice!! It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable
pdonyinaat May 06,2016 The attack replaces the deleted files with JPEG images - obstructing any potential file recovery by the victim. This is bad