Blog Posts Tagged with "Wiper"

5c34159020b03e81c9ae7077282a2bd4

NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Three Days of The Condor... With Malware

September 07, 2012 Added by:Infosec Island Admin

Pandora’s box has been opened. All the players are taking the field, and many of them may not be ready to play a proper game… Shamoon did it’s thing, but it seems to be more a brute force tool than an elegant piece of code and a slick plan. The blowback though is yet to be determined...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Shamoon - DistTrack Malware

August 30, 2012 Added by:Infosec Island Admin

W32.DistTrack, also known as “Shamoon,” is an information-stealing malware that also includes a destructive module. Shamoon renders infected systems useless by overwriting the Master Boot Record (MBR), the partition tables, and most of the files with random data. Once overwritten, the data are not recoverable...

Comments  (0)

296634767383f056e82787fcb3b94864

Who's Responsible for the Saudi Aramco Network Attack?

August 28, 2012 Added by:Jeffrey Carr

Iran is at the center of every significant aspect of this attack. It is the only nation with access to the original Wiper virus from which Shamoon was copied. Perhaps Iran has learned something from Russia about the strategy of misdirection via the government's recruitment of patriotic hackers...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

Shamoon Malware: Cyber Espionage Tool or Cyber Weapon

August 20, 2012 Added by:Pierluigi Paganini

Many hypotheses have been proposed, and some experts are convinced that Shamoon is a new state sponsored malware designed for cyber espionage that is also able to destroy the victims' device, perhaps to hide its operations by deleting evidence that can link the agents to the Command & Control servers...

Comments  (0)