Security Market Segment LS
Thursday, 12 January 2017 08:43

Shamoon: control, alt, deletes – everything

By

New malware called Shamoon, a variant of the older DistTrack, has been found to erase all hard drives and mapped storage on networked Windows physical or virtual machines. It is so virulent that one it is in the network it is game over.

DistTrack was created in 2012 for cyber-espionage. Its primary purpose was to wreak havoc on government, utilities, military, and big corporate targets. Shamoon adds the ability to remotely turn on file-sharing and disable user access for remote control sessions. It is tough to stop with firewalls or antivirus.

iTWire has received alerts from various antivirus/malware companies. This report is based on Palo Alto and Symantec security alerts and a perhaps a more novel way of protecting data – via TrapX’s DeceptionGrid that sets up a decoy “fake” system that mimics the genuine operational IT system to protect it.

At this time the malware seems to be focused on larger targets in the Middle East (Saudi Arabia), but variants are already appearing that can counter, the counter-measures taken for DistTrack.

The attack spreads to other systems on the local network by logging in using legitimate domain account credentials, copying itself to the system and creating a scheduled task that executes the payload. The initial account credentials are specific to the targeted organisation.

Palo Alto says  it appears to like systems using Huawei’s virtual desktop infrastructure (VDI) solutions, such as FusionCloud. VDI solutions can provide some protection against this attack through the ability to load snapshots of wiped systems. The fact that the Shamoon attackers had Huawei usernames and passwords suggests they are targeting specific high-value organisations. It is not suggesting Huawei is at fault or that its VDI passwords have been compromised – but the attackers used that route for at least one attack.

TrapX takes a different route that creates a fake IT system (called a trap as part of its DeceptionGrid) to allow malware to do its worst without affecting the corporate network. Traps appear as the only real assets within the legitimate IT network. Any attack on a trap generates alerts and provides sophisticated analysis of the attack. Its report suggests DistTrack has destroyed more than 30,000 systems and it is now in the wild and able to be used on any organisation where a single admin login credential can be obtained.

It says Shamoon uses data obfuscation and encryption techniques to make it more difficult to detect and analyse, even by security professionals. It also uses anti-debugging techniques, calling Windows API functions such as IsDebuggerPresent to determine whether it is being analysed by a debugger or a sandbox. It also has sophisticated anti-virtual-machine capabilities, designed to evade detection by isolated VM environments.

Symantec also commented on the malware saying that while its intent was the destruction of data and massive inconvenience of reconfiguring every workstation and system attacked the technology behind it could also be used to deliver a ransomware payload.

All reports have similar conclusions – the malware wreaks destruction across any system it attacks by deleting everything and overwriting the MBR so that even drives are no longer bootable.


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments