You searched for Shamoon | SC Media

Your search for Shamoon returned 30 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

News remove
Security News remove

Your search for Shamoon returned 30 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Cybercrime, Malware, Security News

Shamoon disk wiper attack on Saipem signals new affront against energy sector, Middle Eastern interests

The malware used to disrupt the global operations of Italian energy contractor Saipem S.p.A. earlier this week was none other than Shamoon, a disk wiper that’s been used in two prior attacks against Saudi interests. Saipem identified Shamoon as the culprit in a Dec. 12 news release that updated its previously vague disclosure of the incident.…
APTs/cyberespionage

Report: Multiple groups likely collaborating on Shamoon malware campaign

Analysis of the 2016-2017 Shamoon malware attacks against Saudi organizations suggests that multiple hacker groups may be collaborating on this effort on behalf of a nation-state actor, according to a new blog post and technical analysis published this week by McAfee. “We found that the latest Shamoon campaigns… are connected to other notable campaigns, and…
Malware

Shamoon entry point detected, IBM report

Researchers are closer to uncovering the miscreant behind a deadly cyberattack that affected thousands of computers used by government and civil organizations in the Gulf states.
APTs/cyberespionage, Cybercrime, Malware, Security News

Bahraini oil company reportedly attacked by new ‘Dustman’ disk wiper

Bapco, the national oil company of the Persian Gulf island nation of Bahrain, was reportedly targeted in a Dec. 29 disk wiper attack that officials believe originated from Iran-backed hackers. Iran is historically associated with past disk wiper campaigns against energy companies, most notably the destructive Shamoon or Disttrack malware attack against the Saudi Arabian…
APTs/cyberespionage, Cybercrime, Security News

APT33 sics small, elusive botnets on U.S. and global targets

Reputed Iranian threat actor APT33 has been employing more than a dozen secret botnets to infiltrate and spy on the networks of various Middle Eastern, U.S. and Asian organizations, and are even setting up their own VPN networks to conceal their operations, according to researchers. Trend Micro described these findings in a blog post this…
Next post in Cybercrime