EnterpriseNewsSecurity

Fireeye Responds to Shamoon’s Wave of Destructive Cyberattacks in the GCC Region

Security vendor FireEye has announced that it has recently discovered a wave of attacks targeting the GCC states. In 2012, a suspected Iranian hacker group called the “Cutting Sword of Justice” used malware known as Shamoon – or Disttrack – to target energy companies in the Middle East.

During that incident, tens of thousands of computers were compromised. In mid-November, Mandiant responded to the first Shamoon 2.0 incident against an organization located in the Gulf States. Since then, Mandiant has responded to multiple incidents at other organizations in the region.

Shamoon 2.0 is a reworked and updated version of the malware we saw in the 2012 incident. Analysis shows the malware contains embedded credentials, which suggests the attackers may have previously conducted targeted intrusions to harvest the necessary credentials buy cipro online safe before launching a subsequent attack.

While it is widely believed that Iran-based threat actors launched the Shamoon attacks of 2012, it is still unclear who was behind the recent incident or the extent of compromise.

“In light of these attacks, it is strongly recommended that critical infrastructure organizations and government agencies (especially those in the GCC region) continue to regularly review and test disaster recovery plans for critical systems within their environment,” said Fireeye in a statement.

The company went on to say that should a breach be suspected, it is also recommended that client-to-client communication be stopped, so as to slow down the spread of the malware. “The credentials of all privileged accounts should be changed and local administrator passwords per system should be unique,” said the company.

Show More

Chris Fernando

Chris N. Fernando is an experienced media professional with over two decades of journalistic experience. He is the Editor of Arabian Reseller magazine, the authoritative guide to the regional IT industry. Follow him on Twitter (@chris508) and Instagram (@chris2508).

Related Articles

Leave a Reply

Back to top button