Modasiyaat July 28,2016 A fair analysis.The virus didn't took much and was not so sophisticated to be carried out but affected many large enterprises. In near future USB drives would be disabled from most the the critical enterprises which I suppose is already being followed. Malware target of wiping the MBR and thereby making a huge damage to the system was intresting.
kbacon5at September 23,2016 That was a very interesting video about the Shamoon virus. I read that Saudi Aramco had invested a lot to secure the industrial control systems but the attackers hurt the company by targeting desktops and Windows systems. In the video they point out that it was an insider threat and it seems like it would be very hard to attack successfully without someone on the inside for this virus. This is a good example of how the people in the organization can be the weakest link.
dbegumat September 23,2016 The analysis of the Shamoon virus was good but I didn’t quite understand how it was done. It’s definitely required a lot of process before it was able to in fact 30,000 pcs. And what I didn’t understand was that, it seem like it was an attack on Saudi’s system but then why place burning American Flag on the share. I guess some work doesn’t have explanation. The insight from JSahm151 was pretty good not knowing the danger of deleting the MBR. Definitely, an interesting video.
BBurgessat October 07,2016 This video makes me look forward to taking the reverse engineering course. The Shamoon virus, although designed in a less sophisticated way, is still very interesting to dissect. To me building the profile of the creators/originators is very interesting. Dissecting Shamoon revealed many things that lend a hand into identifying where this malware came from. Certain paths and lingo was identified, that was similar to other malware in existence and the wipe functionality of the malware replaced similar files with the .jpeg containing a image of a burning US flag. Then lastly the RawDisk software that was used to wipe the MBR, showed that the creator was not advanced enough to create their own MBR wiper. With that said it is important to point out how much damage this "less sophisticated" attack has done on this company in particular. It would be interesting to dissect this malware myself and see first hand how it was designed.
michealb40at November 10,2016 Such a simple attack. That simplicity was what makes it so difficult to point at the correct attacker. The low tech stuff is the hardest to spot sometimes.