Next-Wave Malware Aims for Mayhem, Not Money
To most of our CISO clients, malware is a cost of doing business. It's annoying and ever-present, but for the most part, they have the right toolset in place to identify, block and eradicate it.
Wed, March 20, 2013
CSO — To most of our CISO clients, malware is a cost of doing business. It's annoying and ever-present, but for the most part, they have the right toolset in place to identify, block and eradicate it.
As malware has evolved from generic attacks and script kiddies to more targeted, persistent attacks aimed at gaining data and information for financial gain, security organizations have also stepped up their anti-malware game, bolstering signature-based tools, such as antivirus and intrusion-detection and -prevention systems, with more sophisticated software like data-loss prevention (DLP), network-forensics and malware-analysis tools.
Enter the Shamoon virus. On the face of it, last August's attack on Saudi Aramco, the Saudi Arabian national oil and natural gas company, was just another in an endless stream of generic malware.
But Shamoon is something different --and far more pernicious --due to its intent. Instead of gathering and exfiltrating data for economic gain, it aimed to cripple Aramco in a brazen act of geopolitical score-settling. It was the equivalent of an electronic haymaker aimed at knocking down Saudi Arabia's leading oil-production enterprise.
In fact, at the time of the attack, Defense Secretary Leon Panetta said the Shamoon virus "was probably the most destructive attack the business sector has seen to date."
Some background on Shamoon: Also known as W32.Disttrack, Shamoon is a variant of the Wiper virus. It reportedly infiltrated Aramcos corporate network via a targeted spear phishing attack and then spread to other networked computers via shared hard drives. The virus compiled a list of files from the infected systems, erased them by overwriting them with garbage text, and then sent information about them back to the attacker. It then overwrote and replaced the master boot record of the infected system with an image of a burning American flag, effectively rendering the system useless.
Luckily, Shamoon missed its intended target: Aramco's process-control equipment was on a separate network and remained up and running. But the consequences were still severe for the company, which saw the virus knock over 30,000 desktops, all of which had to be replaced. It took the firm nearly two weeks to return to normal operations.
A group calling itself the Cutting Sword of Justice claimed responsibility for Shamoon, saying it unleashed the virus on Aramco in response to what it called Saudi "crimes and atrocities" in countries such as Syria and Bahrain.
Shamoon is not just another piece of annoying malware. It's a harbinger of a something far more insidious: destructive, targeted malware sent with the goal of crippling an enterprise to settle a geopolitical score.