-
sliu23
at October 28,2015
The evolution of malware from previous ones is good way to accelerate development cycles. The malware writer can use sophisticated technique applied in the previous malware to achieve his goals. However, it would be easier to identify the malware developer and even attacker. Shamoon virus is similar to the Flame virus, which indicates us that the virus shares the similar background with Flame virus. Fortunately, Shamoon virus just modified the MBR to destruct the Windows system boot procedure and didn’t cause physic damage to the Saudi Aramco oil infrastructure. Otherwise, the environment and workers would also be endangered by this attack. But what about the next attack?
-
zsesay
at November 05,2015
Like I commented in the past video, these hackers needs psychiatric evaluation. Using Shamoon virus to wipe/delete a system, I cannot image such people exist in this universe.
-
gcorker
at November 14,2015
Good analysis. This video and some of the articles I read on Shamoon highlighted that it was not an especially sophisticated virus. It's crazy to how destructive something can be that is considered to be not too difficult execute.
-
tshafi
at November 15,2015
This video was good in that it showed aspects related to the sophistication and scope of the Shamoom virus. It points to evidence of it being an inside job, the signs of it being political, the scale of devastation and evidence that a hacktivist group was involved. It is illuminating in the way that we see certain characteristics can lead us to notice certain things about the virus. I learned that this virus was probably not written from scratch, which suggests that there are other organizations responsible for its existence and other potential victims of the virus.
-
Beggsse
at November 20,2015
The video nicely summarizes the main ideas for a higher level briefing on the Shamoon virus. The analytical aspects are most interesting as attacks are compared to previous attacks for similarities and differences, as to sophistication, motivation, insider or outsider, targets, and goals. The fact that this non-nation state hack was able to infect and wipe clean 30k computers reveals the vulnerability that all companies face especially those hacked with the help of insiders. Hopefully the knowledge gained will help prevent future attacks by both hacktivists as well as those seeking financial gain.