You searched for Shamoon | SC Media

Your search for Shamoon returned 5 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

News remove
Last 2 years remove
Post remove

Your search for Shamoon returned 5 results

Sort Results:

Relevant Recent

Did you mean: shannon

APTs/cyberespionage, Cybercrime, Malware, Security News

Shamoon disk wiper attack on Saipem signals new affront against energy sector, Middle Eastern interests

The malware used to disrupt the global operations of Italian energy contractor Saipem S.p.A. earlier this week was none other than Shamoon, a disk wiper that’s been used in two prior attacks against Saudi interests. Saipem identified Shamoon as the culprit in a Dec. 12 news release that updated its previously vague disclosure of the incident.…
Cyber Command
APTs/cyberespionage, Security News, Vulnerabilities

Cyber Command warns hackers exploiting Outlook vulnerability to attack gov’t agencies

The U.S. Cyber Command warned that a threat group was exploiting a vulnerability in Outlook in an effort to attack government agencies and uploaded samples that one security researcher said are linked to APT33 and Shamoon2. “USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching. Malware is currently delivered from: ‘hxxps://customermgmt.net/page/macrocosm’,” Cyber…
APTs/cyberespionage, Cybercrime, Malware, Security News

Bahraini oil company reportedly attacked by new ‘Dustman’ disk wiper

Bapco, the national oil company of the Persian Gulf island nation of Bahrain, was reportedly targeted in a Dec. 29 disk wiper attack that officials believe originated from Iran-backed hackers. Iran is historically associated with past disk wiper campaigns against energy companies, most notably the destructive Shamoon or Disttrack malware attack against the Saudi Arabian…
APTs/cyberespionage, Security News

Elfin, aka APT33, targets U.S., Saudi Arabian firms in cyberespionage campaign

The cyberespionage group Elfin, aka APT33, has launched a heavily targeted campaign against multiple organization in Saudi Arabia and the United States. Researchers said the most recent targets include major corporations and despite 42 percent of observed attacks focusing heavily on Saudi Arabia. The U.S. has also been an area of interest for the group…
APTs/cyberespionage, Cybercrime, Security News

APT33 sics small, elusive botnets on U.S. and global targets

Reputed Iranian threat actor APT33 has been employing more than a dozen secret botnets to infiltrate and spy on the networks of various Middle Eastern, U.S. and Asian organizations, and are even setting up their own VPN networks to conceal their operations, according to researchers. Trend Micro described these findings in a blog post this…
Next post in Cybercrime