Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

Organizations in the United Arab Emirates and Saudi Arabia are once again being targeted in a new wave of attacks involving Shamoon, a malware strain that was used to destroy more than 30,000 PCs at oil giant Saudi Aramco in 2012.

The latest attacks come after a two-year lull and are doubly destructive since they include a new component, Filerase, for erasing files on an infected system before Shamoon wipes the master boot record clean, Symantec states in a report. The addition of Filerase makes it almost impossible for victims to recover data from impacted systems, the security vendor notes.

Based on a breach disclosure from Italian oil services firm Saipam, the new Shamoon attacks appear to have begun Dec. 10. Saipam, a leading provider of drilling services, described the attack as impacting up to 100 PCs and between 300 and 400 servers located in the Middle East, India, Scotland, and Italy.

"The attack led to the cancellation of data and infrastructures, typical effects of malware," according to Saipem. "The restoration activities, in a gradual and controlled manner, are under way through the back-up infrastructures and, when completed, will re-establish the full operation of the impacted sites." Reuters quoted a Saipem executive as saying the attacks had originated in the south Indian city of Chennai, though Symantec itself says it has no evidence to corroborate.

However, according to Symantec, its researchers have found evidence of attacks against at least two other organizations in the oil and gas industry in the Middle East during the same time.

Eric Chien, senior researcher at Symantec, says the company is still early in the investigation process and has so far been unable to determine whether the same group that was behind the original Shamoon attacks is behind the latest ones as well.

One of the companies impacted in the latest attacks was also recently attacked by Elfin/APT 33, an Iranian threat group that has been targeting aerospace and energy-sector targets. The proximity of the two attacks makes it possible the two campaigns are linked, Chien says.

The Hunt for Motives
At this time it's unclear why the companies were targeted and how the attackers are distributing Shamoon and the new Fireraser component. Chien describes Filerase as deleting files in [ROOT_DRIVE]\Users and on other drives that are less than 100 MB in size.

Once Filerase infects one system, it spreads across the victim network using a list of targeted systems and another tool called Spreader.exe. The list, in the form of a text file, is specific to each victim and suggests that the attackers likely gathered the information from previous reconnaissance activity on the network, Symantec said. Once Filerase has been successfully copied on all computers in the attacker's list, the Spreader component simultaneously triggers it on the systems.

Symantec says it is possible that Shamoon itself was spread via the same mechanism on the impacted networks. "In at least one instance, Shamoon was executed using PsExec, indicating that the attackers had access to credentials for the network," the company says in its report.

Baan Alsinawi, president and founder of risk management firm TalaTek, says that based on publicly available information about the attack on Saipem, there's a good possibility the attackers had physical access to the Italian company's systems. "The lack of a network component and a command-and-control center, as described, suggested the attacker had installed the malware manually and set a time for it to propagate" she says.

So while it is bad the attackers were able to inflict damage, if they first needed physical access, their ability to impact other companies is going to be somewhat limited, Alsinawi says. Gaining physical access, and likely needing escalated privileges, is a higher bar to achieve in these types of attacks, she says.

This is not the first time Shamoon has resurfaced after disappearing. "We've now seen the malware taken out of retirement every few years," Chien says. After first emerging in 2012 and being used a series of very disruptive attacks against Saudi Aramco and other Saudi energy companies, the malware went dormant before making a comeback in late 2016, he notes.

"With the introduction of this most recent iteration, organizations need to remain vigilant and ensure that all data is properly backed up and a robust security strategy is in place," Chien says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Threats for 2021
Or Azarzar, CTO & Co-Founder of Lightspin,  12/3/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Assessing Cybersecurity Risk in Todays Enterprises
Assessing Cybersecurity Risk in Todays Enterprises
COVID-19 has created a new IT paradigm in the enterprise and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27772
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could po...
CVE-2020-27773
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to appli...
CVE-2020-28950
PUBLISHED: 2020-12-04
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
CVE-2020-27774
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but co...
CVE-2020-27775
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but c...