mariawhit8at April 29,2015 I've never heard of the Shamoon virus...but it just goes to show that even in 2012 people still haven't learned not to pick up unknown USB devices and stick them into their systems.
skatakamat April 29,2015 This is quite destructive. The way it erases MBR tells us the technical ability of the malware authors of shamoon.
tlawlessat July 09,2015 No amount of virus scanning can defeat an insider. Yet again we see that people are more important to system and network security than the HW/SW protection mechanisms themselves. I think the use of COTS applications or shared code bases is a driver of the skyrocketing malware volume we see each day.
achanthaat July 12,2015 This is my first time hearing about this virus but I can see how destructive it was. I agree with @knc278, I also believe someone on the inside have strong opinions about what was being done and may have disclosed that information to someone involved with hacktivist or may have been involved with it themselves.
mrgodfrey3at July 15,2015 Shamoon can spread from an infected machine to other computers on the network. Once it infects a node, the virus continues to gather data from the network, upload them to the attacker, and erases the data fro the source. Finally the virus overwrites the master boot record of the infected computer, making it unbootable. This virus has attacked networks in the Saudi energy sector and it still looms as a destructive threat.