Data-wiping Shamoon targets Middle East energy sector

Powered by SC Magazine
 

Goals of malware writers unknown.

Researchers are warning of the latest advanced cyber threat, Shamoon, which has targeted at least one energy company in the Middle East.

Also referred to as Disttrack, the virus is capable of overwriting computer files to the point that the targeted machine is unusable. On Wednesday, a Saudi Arabia oil company, Saudi Aramco released a statement about a sudden disruption in their network due to a virus.

The company did not confirm any link to Shamoon, though the malware has been speculated as the potential culprit.

"The disruption was suspected to be the result of a virus that had infected personal workstations without affecting the primary components of the network," said the statement from Saudi Aramco. The oil company said the virus had "no impact whatsoever" on its production operations.

Kevin Haley, director of Symantec Security Response, told SC Magazine on Thursday that Shamoon's attacks are limited but damaging.

In an initial summary of the attack published upon discovery of the virus, Symantec said Shamoon had caused fewer than 50 infections. 

Victims won't see signs of compromise until after their computer has rebooted, Haley said.

“They will start to see strange things happen, since a lot of the files on their computer have been rewritten,” he said. “You may see error messages, and parts of the files on the computer will be rewritten to the point that the machine will fail to work at all.”

Once Shamoon infects one machine, it will try to copy itself onto others in the network.

One method the worm might use to target organisations is a mass email containing a message – such as a security update normally sent out to employees – to dupe recipients into clicking on an embedded link and thus installing it.

In an email on Thursday, Aviv Raff, chief technology officer at advanced threat detection company Seculert, informed SC Magazine that an attacker first takes control of an internal machine which has a connection to the internet and sets it as a proxy, which then allows the trojan to infect other internal machines -- most likely those which are not directly connected to the internet.

"After the intended action is complete, it wipes the machines sending information about the files through the proxy infected machine to the outside command-and-control server,” Raff said.

In a follow-up interview on Friday, he said the goal of the malware is still unclear, though whomever is behind the attacks may seek to do more than just destroy data.

"It does seem to be more than just wiping files, as they send the information about the wiped filed through another internal machine," Raff wrote.

Liam O Murchu, manager of operations at Symantec Security Response, said in an email that the attacker or attackers' intention could be to stage a protest.

"The end result is not yet fully known," Murchu said. "It's hard to say for sure why the threat seems to have targeted an energy sector company in the Middle East at this time,"

According to Haley, Shamoon is the name of the directory the malware was developed in. It also is an Arabic form of the name “Simon.”

Because of the malware's data-wiping capabilities, researchers initially wondered about potential links between Shamoon and Flame, a spy virus that also targeted computers in the Middle East, mainly Iran. It is believed the United States was behind Flame.

Kaspersky shot down theories that the attack incidents were related, however, in a blog posted Thursday, saying Shamoon used a different pattern when infecting machines.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Data-wiping Shamoon targets Middle East energy sector
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 339

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote