In an interview with Dark Reading yesterday, Jim Jaeger, vice president of cybersecurity services for General Dynamics Fidelis Cybersecurity Solutions, said the wiper malware used in the attacks, while similar in some ways to the Shamoon data-destroying malware, was "a little less effective" and easier to recover from.
"Our focus has been on the recovery process -- recovering data and enabling a reboot of the computer without generating a whole clean reload. It looks like there is a way to do that," he said in the interview.
Today, Jaeger's team announced in a blog post that they indeed were able to prove that files and data wiped by the malware, which overwrote the Master Boot Record (MBR) and Volume Boot Record (VBR), are recoverable. So the data that was wiped isn't gone forever.
The Fidelis Cybersecurity Solutions team used the same recovery techniques they used to restore data lost in the Shamoon attacks against Saudi Aramco last summer. They were able to detect the new so-called Darkseoul or Jokra malware as it hit the network in tests, and ultimately restore any data that was overwritten by the malware.
"The malware samples that have been analyzed by our team are different in code and function from the Shamoon malware. However, by using the same recovery methods found in advisory #1007 the files and data are indeed recoverable," the researchers wrote today, along with instructions for how to restore the lost data (PDF).
Jaegar described the Darkseoul/Jokra malware as "more streamlined and simplistic" than Shamoon, but similar in the fact that it goes after the MBR and wipes data.
"What's impressive about this attack is its ability to hit multiple commercial entities in what appears to be a fairly orchestrated manner," he says.
This type of old-school destructive attack is back, and this won't be the last time we see it. "[The attack on] Aramco [with Shamoon] was something we hadn't seen in some time. I think there's a likelihood of copycat attacks," Jaegar says. "I suspect we're going to be seeing more of these in the future."
Data-annihilation attacks are painful because they are so public, he says, and the damage can be so high reputation-wise for the victim company, such as a bank or media outlet.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.