We get it: Ads are not what you are here for. But ads help us keep the lights on. So, add us to your adblock's whitelist or register for free to remove this notice. Either way, you are supporting our journalism. We'd really appreciate it.
Shamoon is back… one of the most destructive malware families that caused damage to Saudi Arabia’s largest oil producer in 2012 and this time it has targeted energy sector organizations primarily operating in the Middle East.
Earlier this week, Italian oil drilling company Saipem was attacked and sensitive files on about 10 percent of its servers were destroyed, mainly in the Middle East, including Saudi Arabia, the United Arab Emirates and Kuwait, but also in India and Scotland.
Saipem admitted Wednesday that the computer virus used in the latest cyber attack against its servers is a variant Shamoon—a disk wiping malware that was used in the most damaging cyber attacks in history against Saudi Aramco and RasGas Co Ltd and destroyed data on more than 30,000 systems.
Meanwhile, Chronicle, Google’s cybersecurity subsidiary, has also discovered a file containing Shamoon sample that was uploaded to VirusTotal file analyzing service on 10th December (the very same day Saipem was attacked) from an IP address in Italy, where Saipem is headquartered.
However, the Chronicle was not sure who created the newly discovered Shamoon samples or who uploaded them to the virus scanning site.
The latest attack against Saipem reportedly crippled more than 300 of its servers and about 100 personal computers out of a total of roughly 4,000 machines, though the company confirmed that it had already backed up the affected computers, so there no possibility of data being lost in the cyber attack.
“Saipem reports that the cyber attack hit servers based in the Middle East, India, Aberdeen and, in a limited way, Italy through a variant of Shamoon malware,” Saipem said in its press release.
“The restoration activities, in a gradual and controlled manner, are underway through the backup infrastructures and, when completed, will re-establish the full operation of the impacted sites.”
Shamoon, also known as Disttrack, works by disabling systems by overwriting key computer files, including the master boot record (MBR), making it impossible for computers to start up.
It is still unclear who actually created Shamoon, but security researchers widely believe that the Iranian hacking groups OilRig, Rocket Kitten, and Greenbug working on behalf of the Iranian government were behind previous Shamoon attacks, though Iran has strongly denied.