Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Network Security
Real-time info services with Neustar
Average Rating:
Rate this article:  
Invasion, Deletion, Suicide: Shamoon Attack Has Military Precision
Invasion, Deletion, Suicide: Shamoon Attack Has Military Precision

By Adam Dickter
August 17, 2012 1:52PM

Bookmark and Share
Shamoon "could be a competitor trying to disadvantage someone or maybe just an angry customer or some hacker trying to have some fun," Symantec's Kevin Haley told us regarding the newly discovered Trojan. "It reports back the files that were deleted, apparently not for any espionage value. Maybe someone is getting his jollies this way."
 


It sneaks into your computer, infiltrates your files, deletes data and renders your computer unusable. Then it kills itself.

The frightening new Trojan Horse -- unique from other malware because of its destructive tendency -- is called Disttrack, and it has been detected in one targeted threat against "an organization in the energy sector," says cybersecurity software maker Symantec.

Dropper, Wiper and Reporter

Symantec said the company is in the Middle East but has not released other details. According to a Symantec blog post the malware has three components, which are reminiscent of military-style attack: The Dropper, which invades and drops in other modules; the Wiper, which destroys the computer files by overwriting the master boot record, and the Reporter, which sends information back to the attacker that the infection was successful.

The series of targeted attacks has been dubbed Shamoon, because of a folder with that name created by the hacker and found in the program. "We can see it was developed in a directory called Shamoon and the people behind this left it in the code," Kevin Haley, director of Symantec's Security and Technology Response Team told us in an interview Friday.

He said there was no indication the attack was tied to the notorious hacker group Anonymous or its offshoot, LulzSec, which have targeted private and government servers here and abroad in a series of brazen attacks over the last few years, boasting of their exploits through Twitter.

"Those folks generally aren't shy about saying what they've done," said Haley. There have been no claims of credit for the attack, which seemed intent on causing damage rather than retrieving information, as LulzSec has done, ostensibly to point out security flaws.

Keeping Score And Getting Jollies

"This could be a competitor trying to disadvantage someone or maybe just an angry customer or some hacker trying to have some fun, or their idea of fun," Haley said. He said there are no reports of a Shamoon attack at any other company. "It reports back the files that were deleted, apparently not for any espionage or spy value but to kind of keep score. Maybe someone is getting his jollies this way."

He said the Disttrack code has been detected before in a virus called Flamer.

Another security analyst, Richard Wang, manager of Sophos Labs US, said the incident appears to be isolated and won't likley show up on people's laptops anytime soon.

"It appears to be a targeted attack, with data exfiltration limited to only the target organization," said Wang. "Some of the damage done can be repaired, putting the PC back into a usable state but the user's files may have to be restored from backups.

"Given the targeted nature of the code I think it's unlikely that this particular threat will become widespread."
 

Tell Us What You Think
Comment:

Name:



Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.


 Network Security
1.   Fund Seeks To Head Off Heartbleeds
2.   Lessons from Verizon's Threat Report
3.   Verizon Report Exposes Cyberthreats
4.   How Are Web Sites Post-Heartbleed?
5.   White House Updating Privacy Policy


advertisement
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.