Data-Wiping Malware Shamoon Destroys Files At Italian Oil and Gas Company; Other Energy Companies Operating in the Middle East Warned of Cyber Attacks (zdnet.com) 22
An anonymous reader writes: A new variant of the Shamoon malware was discovered on the network of an Italian and UAE oil and gas companies. While the damage at the UAE firm is currently unknown, the malware has been confirmed to have destroyed files on about ten percent of the Italian company's PC fleet.
Shamoon is one of the most dangerous strains of malware known to date. It was first deployed in two separate incidents that targeted the infrastructure of Saudi Aramco, Saudi Arabia's largest oil producer, in 2012 and 2016. During those incidents, the malware wiped files and replaced them with propaganda images (burning US flag, body of Alan Kurdi). The 2012 attack was devastating in particular, with Shamoon wiping data on over 30,000 computers, crippling the company's activity for weeks. Historically, the malware has been tied to the Iranian regime, but it's unclear if Iranian hackers were behind this latest attacks. This new Shamoon version was revealed to the world when an Italian engineer uploaded the malware on VirusTotal, triggering detections at all major cyber-security firms across the globe.
Shamoon is one of the most dangerous strains of malware known to date. It was first deployed in two separate incidents that targeted the infrastructure of Saudi Aramco, Saudi Arabia's largest oil producer, in 2012 and 2016. During those incidents, the malware wiped files and replaced them with propaganda images (burning US flag, body of Alan Kurdi). The 2012 attack was devastating in particular, with Shamoon wiping data on over 30,000 computers, crippling the company's activity for weeks. Historically, the malware has been tied to the Iranian regime, but it's unclear if Iranian hackers were behind this latest attacks. This new Shamoon version was revealed to the world when an Italian engineer uploaded the malware on VirusTotal, triggering detections at all major cyber-security firms across the globe.
Re: (Score:3)
We do, just the articles are lacking a lot of details. If they didn't mention RDP, I wouldn't have known if it was Windows or a Linux server. I had to basically google Shamoon just to see what systems are affected and learn that it's nothing we haven't seen in the past.
But it does just verify what I've always known, these companies have seriously lacking computer security, lack of backups and no surprise these contractors lost their data, because I know how these people work and they don't even think about
Re: (Score:2, Insightful)
Posting AC because I did some consulting work in UAE, a gig that came about because the UAE was trying to avoid this specific thing.
Big part of the problem in the UAE is that the country is trying very hard to educate the locals to be IT managers in charge of IT contractors who come and go as fast as they can (in accordance with other labor practices in the middle east). When you have IT managers who don't really want to be IT managers, and aren't very good at it, and look down at the people actually doing
Re: (Score:3)
It's new malware
Actually, it's old malware, goes by the name of Windows.
Re: Antivirus (Score:1)
was revealed to the world when ... (Score:2)
was revealed to the world when an Italian engineer uploaded the malware on VirusTotal, triggering detections at all major cyber-security firms across the globe
So at that time, all of the sirens in the AV companies went off exactly at the same time.
There must have been some fun support phone calls there. Signatures are not a bad _first_ step, but really? That's the best we can mostly do??
I had one once trigger on a BAT file I had just written. We had a support contact with an unnamed company, but our McAfee support rep was a bit confused. "How can you be confused? I'm using your predefined scan settings. I wrote it from scratch, so unless there's virus
From the article... (Score:3)
This version of Shamoon overwrites original files with garbage data. This garbage data might look like encrypted content to an untrained eye, but it's just random bits of information that can't be recovered with an encryption key.
LOL. I'd like to meet the "trained eye" that can discern "random bits of information" from "encrypted content".
Are there really... (Score:2)