-
sam
at December 04,2016
Shamoon, Saudi Aramco
How you design a clever mind of such hacking tool and name the file "wiper"? just common sense
Drop itself into the system via USB stick, maybe by insider person
Spread through the network, then delete file
delete the master boot of the computer
rough disk to delete master boot technology
keep the effect in one of the computers
-
sam
at December 04,2016
Shamoon, Saudi Aramco
How you design a clever mind of such hacking tool and name the file "wiper"? just common sense
Drop itself into the system via USB stick, maybe by insider person
Spread through the network, then delete file
delete the master boot of the computer
rough disk to delete master boot technology
keep the effect in one of the computers
-
jwren2
at December 12,2016
Shamoon is just another piece of malware script that was designed to target a specific group. It’s crazy how this malware focused on Energy companies. Especially when it targeted 30,000 machines from Saudi Aramco. These hacktivist groups have done so much damage to specific networks and are a force to be reckoned with because they are highly skilled.
-
Taylorlou
at December 14,2016
I've never heard of Shamoon before. I've heard about Flame and it's relation to the big bad Stuxnet and there are some similarities in the attacks. But, this similarities are more about the reconnaissance and physical execution. For instance, they believe it was probably an inside job brought in from a USB or some sort of external storage hooked up to a system and then, in this case, infected 30,000 computers on the network. It also was very stealthy, but the main difference here is that it wasn't as sophisticated. But, this also shows how malware doesn't necessarily need to be sophisticated to cause a large amount of damage to either one or many hosts that it infects.
-
jharg409
at December 14,2016
So, Shamoon is less sophisticated than Flame but it still did it's job. It amazes me that things like this, less sophisticated, still managed to get by top minds. After more devastating malware, why isn't there a think tank that accesses all the ways malware like this can succeed?