Shamoon

Shamoon[a] (Persian: شمعون), also known as W32.DistTrack,[1] is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature of the attack and the cost of recovery. Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the master boot record of the infected computer, making it unusable.[2][3]

The virus was used for cyberwarfare[4] against national oil companies including Saudi Arabia's Saudi Aramco and Qatar's RasGas.[5][2][6] A group named "Cutting Sword of Justice" claimed responsibility for an attack on 30,000 Saudi Aramco workstations, causing the company to spend more than a week restoring their services.[7] The group later indicated that the Shamoon virus had been used in the attack.[8] Computer systems at RasGas were also knocked offline by an unidentified computer virus, with some security experts attributing the damage to Shamoon.[9] It was later described as the "biggest hack in history".[3]

Symantec, Kaspersky Lab,[10] and Seculert announced discovery of the malware on 16 August 2012.[2][11] Kaspersky Lab and Seculert found similarities between Shamoon and the Flame malware.[10][11] Shamoon made a surprise comeback in November 2016,[12] January 2017,[13] and December 2018.[14]

Design

Shamoon was designed to erase and overwrite hard drive data with a corrupted image and report the addresses of infected computers back to the computer inside the company's network.[15] The malware had a logic bomb which triggered the master boot record and data wiping payload at 11:08 am local time on Wednesday, August 15. The attack occurred during the month of Ramadan in 2012. It would appear that the attack was timed to occur after most staff had gone on holiday reducing the chance of discovery before maximum damage could be caused, hampering recovery.

The virus consisted of three components, the Dropper, the Wiper and the Reporter. The Dropper, the source of the infection, creates a service with the name 'NtsSrv' that enables it to remain persistent on the infected computer. The Dropper was built in 32-bit and 64-bit versions. If the 32-bit dropper detects a 64-bit architecture, it drops the 64-bit version. This component drops the Wiper and the Reporter onto the infected computer and executes itself. It spreads across a local network by copying itself to network shares and on to other computers.[16]

The Wiper component utilizes an Eldos-produced driver known as RawDisk to achieve direct user-mode access to a hard drive without using Windows APIs. It identifies the locations of all files on the infected computers and erases them. It sends information about the files destroyed to the attacker and then overwrites the erased files with corrupted data so they cannot be recovered. The component used portions of an image. In the 2012 attack it used an image of a burning U.S. flag; in the 2016 attack it used a photo of the body of Alan Kurdi.[17][18][12]

Before the attack

The malware was unique, used to target the Saudi government by causing destruction to the state-owned national oil company Saudi Aramco. The attackers posted a pastie on Pastebin hours prior to the wiper logic bomb occurring, citing "oppression" and the Saudi government as a reason behind the attack.[19] According to Chris Kubecka, a security advisor to Saudi Aramco after the attack and group leader of security for Aramco Overseas, the attack was well-staged.[3] It was initiated by a phishing email attack that an unnamed Saudi Aramco Information Technology employee opened, giving the group entry into the company's network around mid-2012.[20]

We, behalf of an anti-oppression hacker group that have been fed up of crimes and atrocities taking place in various countries around the world, especially in the neighboring countries such as Syria, Bahrain, Yemen, Lebanon, Egypt and ..., and also of dual approach of the world community to these nations, want to hit the main supporters of these disasters by this action. One of the main supporters of this disasters [sic] is Al-Saud corrupt regime that sponsors such oppressive measures by using Muslims oil resources. Al-Saud is a partner in committing these crimes. It's [sic] hands are infected with the blood of innocent children and people. In the first step, an action was performed against Aramco company, as the largest financial source for Al-Saud regime. In this step, we penetrated a system of Aramco company by using the hacked systems in several countries and then sent a malicious virus to destroy thirty thousand computers networked in this company. The destruction operations began on Wednesday, Aug 15, 2012 at 11:08 AM (Local time in Saudi Arabia) and will be completed within a few hours.[21]

Pastie announcing attack against Saudi Aramco by a group called Cutting Sword of Justice

Kubecka described in a Black Hat USA talk that Saudi Aramco placed the majority of their security budget on the ICS control network, leaving the business network at risk for a major incident.[20]

During the attack

On 15 August at 11:08 am local time, over 30,000 Windows based systems began to be overwritten. Symantec found some of the affected systems showed an image of an American flag while their data was being deleted and overwritten.[2] Saudi Aramco announced the attack on their Facebook page and went offline again until a company statement was issued on 25 August 2012. The statement falsely reported normal business was resumed on 25 August 2012. However a Middle Eastern journalist leaked photographs taken on 1 September 2012 showing kilometers of petrol trucks unable to be loaded due to hacked business systems still inoperable.

Tanker trucks unable to be loaded with gasoline due to Shamoon attacks

"Saudi Aramco has restored all its main internal network services that were impacted on August 15, 2012, by a malicious virus that originated from external sources and affected about 30,000 workstations. The workstations have since been cleaned and restored to service. As a precaution, remote Internet access to online resources was restricted. Saudi Aramco employees returned to work August 25, 2012, following the Eid holidays, resuming normal business. The company confirmed that its primary enterprise systems of hydrocarbon exploration and production were unaffected as they operate on isolated network systems. Production plants were also fully operational as these control systems are also isolated."

On August 29, 2012 the same attackers behind Shamoon posted another pastie on PasteBin.com, taunting Saudi Aramco with proof they still retained access to the company network. The post contained the username and password on security and network equipment and the new password for Aramco CEO Khalid Al-Falih.[22] The attackers also referenced a portion of the Shamoon malware as further proof in the pastie:

"mon 29th aug, good day, SHN/AMOO/lib/pr/~/reversed

We think it's funny and weird that there are no news coming out from Saudi Aramco regarding Saturday's night. well, we expect that but just to make it more clear and prove that we're done with we promised, just read the following facts -valuable ones- about the company's systems:

- internet service routers are three and their info as follows:

Core router: SA-AR-CO-1# password (telnet): c1sc0p@ss-ar-cr-tl / (enable): c1sc0p@ss-ar-cr-bl
Backup router: SA-AR-CO-3# password (telnet): c1sc0p@ss-ar-bk-tl / (enable): c1sc0p@ss-ar-bk-bl
Middle router: SA-AR-CO-2# password (telnet): c1sc0p@ss-ar-st-tl / (enable): c1sc0p@ss-ar-st-bl

- Khalid A. Al-Falih, CEO, email info as follows:

[email protected] password:kal@ram@sa1960

- security appliances used:

Cisco ASA # McAfee # FireEye :
default passwords for all!!!!!!!!!!

We think and truly believe that our mission is done and we need no more time to waste. I guess it's time for SA to yell and release something to the public. however, silence is no solution.

I hope you enjoyed that. and wait our final paste regarding SHN/AMOO/lib/pr/~

angry internet lovers #SH"

According to Kubecka, in order to restore operations, Saudi Aramco used its large private fleet of aircraft and available funds to purchase much of the world's hard drives, driving the price up. New hard drives were required as quickly as possible so oil prices were not affected by speculation. By September 1, 2012 gasoline resources were dwindling for the public of Saudi Arabia 17 days after the August 15th attack. RasGas was also affected by a different variant, crippling them in a similar manner.[20]

It is unclear why the attacker may have an interest in actually destroying the infected PC. Kaspersky Labs hinted that the 900 KB malware could be related to Wiper, that was used in a cyber attack on Iran in April. After a 2-day analysis, the company erroneously concluded that the malware is more likely to come from "scriptkiddies" who were inspired by Wiper.[23] Later, in a blog post, Eugene Kaspersky clarified the use of Shamoon categorizing as cyberwarfare.[24]

See also

Notes

  1. ^ "Shamoon" is part of a directory string found in the virus' Wiper component.

References

  1. ^ "Joint Security Awareness Report (JSAR-12-241-01B):'Shamoon/DistTrack' Malware (Update B)". United States Department of Homeland Security ICS-CERT. 2017-04-18. Retrieved 2017-11-03.
  2. ^ a b c d Symantec Security Response (2012-08-16). "The Shamoon Attacks". Symantec. Retrieved 2012-08-19.
  3. ^ a b c Jose Pagliery (2015-08-05). "The inside story of the biggest hack in history". Retrieved 2012-08-19.
  4. ^ Iain Thompson (2012-08-17). "Exhibitionist Shamoon virus blows PCs' minds". The Register. Retrieved 2017-11-03.
  5. ^ Tim Sandle (2012-08-18). "Shamoon virus attacks Saudi oil company". Digital Journal. Retrieved 2012-08-19.
  6. ^ "Shamoon virus targets energy sector infrastructure". BBC News. 2012-08-17. Retrieved 2012-08-19.
  7. ^ Nicole Perlroth (2012-10-23). "Cyberattack On Saudi Firm Disquiets U.S." The New York Times. pp. A1. Retrieved 2012-10-24.
  8. ^ Elinor Mills (2012-08-30). "Virus knocks out computers at Qatari gas firm RasGas". CNET. Retrieved 2012-09-01.
  9. ^ "Computer virus hits second energy firm". BBC News. 2012-08-31. Retrieved 2012-09-01.
  10. ^ a b GReAT (2012-08-16). "Shamoon the Wiper — Copycats at Work". Archived from the original on 2012-08-20. Retrieved 2012-08-19.
  11. ^ a b Seculert (2012-08-16). "Shamoon, a two-stage targeted attack". Seculert. Archived from the original on 2012-08-20. Retrieved 2012-08-19.{{cite web}}: CS1 maint: unfit URL (link)
  12. ^ a b Symantec Security Response (2016-11-30). "Shamoon: Back from the dead and destructive as ever". Symantec. Retrieved 2016-12-06.
  13. ^ "Saudi Arabia warns on cyber defense as Shamoon resurfaces". Reuters. 2017-01-23. Retrieved 2017-01-26.
  14. ^ Stephen Jewkes, Jim Finkle (2018-12-12). "Saipem says Shamoon variant crippled hundreds of computers". Reuters. Retrieved 2020-09-24.
  15. ^ Porche III, Isaac R. (2020). Cyberwarfare - An Introduction to Information-Age Conflict/. Artech House. p. 264. ISBN 978-1-5231-3277-5.
  16. ^ Mackenzie, Heather (2012-10-25). "Shamoon Malware and SCADA Security – What are the Impacts?".
  17. ^ Sean Gallagher (2016-12-01). "Shamoon wiper malware returns with a vengeance". Ars Technica. Retrieved 2017-07-03.
  18. ^ Nicole Perlroth (2012-08-24). "Among Digital Crumbs from Saudi Aramco Cyberattack, Image of Burning U.S. Flag". Bits. The New York Times. Retrieved 2017-07-03.
  19. ^ Cutting Sword of Justice (2012-08-15). "Pastie:'Untitled'". Retrieved 2017-11-03.
  20. ^ a b c Christina Kubecka (2015-08-03). "How to Implement IT Security after a Cyber Meltdown". YouTube. Retrieved 2017-11-03. (PDF slides, YouTube video)
  21. ^ Rid, Thomas (2013). Cyber War Will Not Take Place. Oxford University Press. p. 63. ISBN 978-0-19-936546-3.
  22. ^ "Saudi Aramco hug, another one". 2012-08-29. Retrieved 2017-11-03.
  23. ^ Wolfgang Gruener (2012-08-18). "Cyber Attack: Shamoon Malware Infects, Steals, Wipes MBR". Tom's Hardware. Retrieved 2017-03-22.
  24. ^ Eugene Kaspersky (2017-03-06). "StoneDrill: We've Found New Powerful "Shamoon-ish" Wiper Malware – and It's Serious". Retrieved 2017-11-03.

Read other articles:

Pengguna ATM mengautentikasi diri sendiri Autentikasi (dari bahasa Yunani: αὐθεντικός authentikos, nyata, asli, dari αὐθέντης authentes, pengarang), pengautentikan, pembuktian keaslian, pembuktiaslian, penulenan, pengaslian, pengesahan, atau penyahihan adalah tindakan membuktikan pernyataan, seperti identitas pengguna sistem komputer. Berbeda dengan identifikasi yang merupakan tindakan menunjukkan identitas seseorang atau sesuatu, autentikasi adalah proses menentusahka...

 

 

Dewan Kerjasama untuk Negara Arab di Teluk (CCASG; Arab: مجلس التعاون لدول الخليج العربيةcode: ar is deprecated ), juga dikenal sebagai Dewan Kerjasama Teluk (GCC; مجلس التعاون الخليجي) adalah sebuah blok dagang yang terdiri dari enam Negara Arab di Teluk Persia dengan banyak tujuan ekonomi dan sosial. Pemerintahan Bendera Nama sigkat Nama resmi Bentuk pemerintahan Bahasa Indonesia Bahasa Arab (transliterasi) Bahrain Kerajaan Bahrain Mamlaka...

 

 

Standard motorcycle This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (August 2022) (Learn how and when to remove this template message) Type of motorcycle BMW G 310 RManufacturerBMW MotorradAlso calledTVS Apache RTR 310Production2015-presentAssemblyHosur, Tamil Nadu, IndiaClassStandardEngine313 cc (19.1 cu in) singleBore / stroke80.0...

1893 Royal Sovereign-class battleship Not to be confused with RMS Empress of India. Empress of India at anchor, 1906 History United Kingdom NameHMS Empress of India NamesakeRegnal title of Queen Victoria Ordered1889 Naval Programme BuilderPembroke Dockyard Cost£912,612 Laid down9 July 1889 Launched7 May 1891 CompletedAugust 1893 Commissioned11 September 1893 Out of serviceEarly 1912 FateSunk as target, 4 November 1913 General characteristics (as built) Class and typeRoyal Sovereign-class pre...

 

 

Северный морской котик Самец Научная классификация Домен:ЭукариотыЦарство:ЖивотныеПодцарство:ЭуметазоиБез ранга:Двусторонне-симметричныеБез ранга:ВторичноротыеТип:ХордовыеПодтип:ПозвоночныеИнфратип:ЧелюстноротыеНадкласс:ЧетвероногиеКлада:АмниотыКлада:Синапси...

 

 

穆罕默德·达乌德汗سردار محمد داود خان‎ 阿富汗共和國第1任總統任期1973年7月17日—1978年4月28日前任穆罕默德·查希爾·沙阿(阿富汗國王)继任穆罕默德·塔拉基(阿富汗民主共和國革命委員會主席團主席) 阿富汗王國首相任期1953年9月7日—1963年3月10日君主穆罕默德·查希爾·沙阿 个人资料出生(1909-07-18)1909年7月18日 阿富汗王國喀布尔逝世1978年4月28日(...

Barony in County Cavan, Ireland Barony in Ulster, IrelandCastlerahan Caisleán Raithin (Irish)BaronyView of Lough RamorBarony map of County Cavan, 1900; Castlerahan is in the southeast, coloured peach.Sovereign stateIrelandProvinceUlsterCountyCavanArea • Total280.36 km2 (108.25 sq mi) Castlerahan (Irish: Caisleán Raithin[1]) is a barony in County Cavan, Ireland.[2] Baronies were mainly cadastral rather than administrative units. They acquired modest...

 

 

Swedish baron and marine insurer (1815–1907) Not to be confused with Harald Fleetwood (1879–1960). This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources.Find sources: Harald Fleetwood 1815–1907 – news · newspapers · books · scholar · JSTOR (August 2023) BaronHarald FleetwoodBornLars Harald Adolf Fleetwood(1...

 

 

County in Michigan, United States County in MichiganSt. Clair CountyCountyFort Gratiot Light SealLocation within the U.S. state of MichiganMichigan's location within the U.S.Coordinates: 42°56′N 82°40′W / 42.93°N 82.67°W / 42.93; -82.67Country United StatesState MichiganFoundedMarch 28, 1820 (created)1821 (organized)[1][2]Named forSt. Clare of AssisiSeatPort HuronLargest cityPort HuronArea • Total837 sq mi (2,170&...

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Kredo – berita · surat kabar · buku · cendekiawan · JSTOR Kredo (bahasa Latin: credo) atau Pengakuan Iman (Belanda: geloofsovertuigingcode: nl is deprecated ) merupakan pernyataan atau pengakuan rang...

 

 

Insieme convesso. Insieme non convesso. In uno spazio euclideo un insieme convesso è un insieme nel quale, per ogni coppia di punti, il segmento che li congiunge è interamente contenuto nell'insieme. Esempi di insiemi convessi sono cerchi, sfere, cubi, piani, semipiani, trapezi, mentre non lo sono archi di circonferenze, tori o qualunque insieme che contenga buchi o incavature o che non sia connesso. In tre dimensioni, esempi di insiemi convessi sono la sfera, il cubo, il paraboloide, mentr...

 

 

此條目的主要貢獻者與本條目所述的內容疑似存在利益衝突。 (2020年4月22日)本條目需要清理以符合維基百科的標準,尤其是中立的觀點、可供查證和非原創研究。受雇编辑者,須按规定申报有偿编辑。掛上此模板的編輯者需在討論頁提供利益衝突證據,以便進一步的討論。 奧伊斯基興 旗幟徽章奧伊斯基興的位置 坐标:50°39′41″N 6°47′14″E / 50.661278°N 6.787256°E...

U.S. college athletic conference Not to be confused with Metro Conference. Metro Atlantic Athletic ConferenceAssociationNCAAFounded1980CommissionerTravis Tellitocci (since 2023)Sports fielded 25 men's: 11 women's: 13 coeducational: 1 DivisionDivision ISubdivisionNon-footballNo. of teams13HeadquartersEdison, New JerseyRegionNortheastern United StatesOfficial websitewww.maacsports.comLocations The Metro Atlantic Athletic Conference (MAAC, /mæk/) is a collegiate athletic conference affiliated w...

 

 

Men's individual time trial at the 2018 Asian GamesVenueSubangDate24 August 2018Competitors18 from 18 nationsMedalists  Alexey Lutsenko   Kazakhstan Muradjan Khalmuratov   Uzbekistan Fumiyuki Beppu   Japan← 20142022 → Cycling at the2018 Asian GamesBMX racingRacingmenwomenMountain bikeCross-countrymenwomenDownhillmenwomenRoadRoad racemenwomenTime trialmenwomenTrackSprintmenwomenKeirinmenwomenIndividual purs...

 

 

天主教徒佔世界各國人口比例一覽圖 天主教主题 個別教會(拉丁語:ecclesia particularis),或稱地區教會、地方教會,是天主教會的一種分類。 簡介 根據天主教會聖統制和法典,在唯一天主教會的最高權力(即教宗及世界主教團(英语:College of Bishops))之下,並且是由主教級所牧養之教會就稱為個別教會,其中首要者為教區,與此類似者則有宗座代牧區、宗座監牧區和宗�...

Association football club in Chesterfield, England Football clubChesterfieldFull nameChesterfield Football ClubNickname(s)Town, The SpireitesFounded19 October 1867; 156 years ago (1867-10-19) (original)24 April 1919; 105 years ago (1919-04-24) (current)[1][2]GroundSMH Group StadiumCapacity10,600OwnerPhil Kirk and Ashley Kirk[3]ChairmanMike GoodwinManagerPaul CookLeagueEFL League Two2023–24National League, 1st of 24 (promoted)Websit...

 

 

2001 television film Not to be confused with Day the World Ended. The Day the World EndedDVD coverScreenplay byMax EnscoeAnnie deYoungStory byBrian KingDirected byTerence GrossStarringNastassja KinskiRandy QuaidBobby EdnerTheme music composerCharles BernsteinCountry of originUnited StatesOriginal languageEnglishProductionProducersLou ArkoffColleen CampStan WinstonCinematographyMark VargoEditorStephen MarkRunning time91 minutesProduction companyCreature Features ProductionsOriginal releaseNetw...

 

 

الدولة الصغيرة (بالإنجليزية: microstate أو ministate) هي دولة ذات سيادة تحتوي على عدد سكان صغير جدًا أو مساحة جغرافية صغيرة جدًا، وعادةً كلاهما. الفرق بين مصطلحي «الدولة» و«الدولة الصغيرة جدًا» ليس مُحددًا بشكل جيد في القانون الدولي. ركزت المحاولات الحديثة، منذ عام 2010، لتعريف الدول...

Somers Carroll Productions is an Australian television production company. Somers Carroll was formed by Daryl Somers and Ernie Carroll, to produce Hey Hey It's Saturday, after original producer Gavin Disney left the series. Somers Carroll also produced compilation specials including The Best and Worst of Red Faces, Hey Hey By Request, The Plucka Duck Show, The Ossie Ostrich Video Show, Hey Hey it's the Comedians, The Russell Gilbert Show, Gonged but not Forgotten, and most recently the two H...

 

 

Neville Southall (بالإنجليزية: Neville Southall)‏  Southall pictured in July 2007 معلومات شخصية الاسم الكامل Neville Southall الميلاد 16 سبتمبر 1958 (العمر 66 سنة)خلنددنو، ويلز الطول 1.85 م (6 قدم 1 بوصة) مركز اللعب حارس مرمى الجنسية المملكة المتحدة  مسيرة الشباب سنوات فريق 1970–1973 Llandudno Swifts 1973–1974 لاندودن�...