IBM shares details on the attack chain for the Shamoon malware

  • 16 February 2017
  • 0 replies
  • 251 views

Userlevel 7
Badge +54

Security experts at IBM published a report that includes precious details on the attack chain of the dreader Shamoon cyberweapon.

 
February 16, 2017  By Pierluigi Paganini
 
The new variant of Shamoon, so-called Shamoon 2, can rewrite the MBR on affected computers with an image of a three-year-old Syrian boy named Alan Kurdi that lay dead on a Turkish beach.
 
“Why Shamoon has suddenly returned again after four years is unknown. However, with its highly destructive payload, it is clear that the attackers want their targets to sit up and take notice,” reported Symantec.
 
In January, researchers at Palo Alto Networks discovered a new strain of the Shamoon 2 malware that was targeting virtualization products.
 
The researchers at IBM’s X-Force Incident Response and Intelligence Services (IRIS) believe Shamoon malware is pivot element in the information warfare between Saudi Arabia and Iran.
 
The malware experts have identified servers used to deliver Shamoon, they have broken onto the server used by the attackers and gathered more information to study the threat and its attack chain.
 
           


 
Full Article

0 replies

Be the first to reply!

Reply