Browse Definitions :
Definition

Shamoon

Contributor(s): Stan Gibilisco

Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector. The malware was first discovered in August 2012, when it compromised thousands of computers in Saudi Arabia. Shamoon attacks computers running Windows NT, Windows 9x, and Windows Me.

Similarities have been found between Shamoon and the Flame virus, which was discovered earlier in 2012 and targeted governmental organizations, educational institutions, and private individuals, primarily in the Middle East, and notably in Iran. Shamoon operates in several stages:

  • An attacker launches Shamoon on a network.
  • The virus spreads to the hard disks of other computers in the network by means of a function called "dropper."
  • The virus compiles lists of files on each infected computer.
  • A function called "reporter" sends information about the files and the malware's activity back to the attacker.
  • A function called "wiper" erases some or all of the compromised files.
  • The virus overwrites the master boot record (MBR) of the computer so that it cannot reboot.

An activist youth group calling itself "Cutting Sword of Justice" claimed responsibility for an attack on Saudi Aramco workstations using the Shamoon virus in August 2012. This attack compromised about 30,000 computers. Restoration took about two weeks. Computer systems at RasGas were also affected in the same month by a virus that some experts believe was Shamoon.

This was last updated in February 2013

Continue Reading About Shamoon

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close