Browse Definitions :
Definition

Shamoon

Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector. The malware was first discovered in August 2012, when it compromised thousands of computers in Saudi Arabia. Shamoon attacks computers running Windows NT, Windows 9x, and Windows Me.

Similarities have been found between Shamoon and the Flame virus, which was discovered earlier in 2012 and targeted governmental organizations, educational institutions, and private individuals, primarily in the Middle East, and notably in Iran. Shamoon operates in several stages:

  • An attacker launches Shamoon on a network.
  • The virus spreads to the hard disks of other computers in the network by means of a function called "dropper."
  • The virus compiles lists of files on each infected computer.
  • A function called "reporter" sends information about the files and the malware's activity back to the attacker.
  • A function called "wiper" erases some or all of the compromised files.
  • The virus overwrites the master boot record (MBR) of the computer so that it cannot reboot.

An activist youth group calling itself "Cutting Sword of Justice" claimed responsibility for an attack on Saudi Aramco workstations using the Shamoon virus in August 2012. This attack compromised about 30,000 computers. Restoration took about two weeks. Computer systems at RasGas were also affected in the same month by a virus that some experts believe was Shamoon.

This was last updated in February 2013

Continue Reading About Shamoon

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close