Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

Organizations in the United Arab Emirates and Saudi Arabia are once again being targeted in a new wave of attacks involving Shamoon, a malware strain that was used to destroy more than 30,000 PCs at oil giant Saudi Aramco in 2012.

The latest attacks come after a two-year lull and are doubly destructive since they include a new component, Filerase, for erasing files on an infected system before Shamoon wipes the master boot record clean, Symantec states in a report. The addition of Filerase makes it almost impossible for victims to recover data from impacted systems, the security vendor notes.

Based on a breach disclosure from Italian oil services firm Saipam, the new Shamoon attacks appear to have begun Dec. 10. Saipam, a leading provider of drilling services, described the attack as impacting up to 100 PCs and between 300 and 400 servers located in the Middle East, India, Scotland, and Italy.

"The attack led to the cancellation of data and infrastructures, typical effects of malware," according to Saipem. "The restoration activities, in a gradual and controlled manner, are under way through the back-up infrastructures and, when completed, will re-establish the full operation of the impacted sites." Reuters quoted a Saipem executive as saying the attacks had originated in the south Indian city of Chennai, though Symantec itself says it has no evidence to corroborate.

However, according to Symantec, its researchers have found evidence of attacks against at least two other organizations in the oil and gas industry in the Middle East during the same time.

Eric Chien, senior researcher at Symantec, says the company is still early in the investigation process and has so far been unable to determine whether the same group that was behind the original Shamoon attacks is behind the latest ones as well.

One of the companies impacted in the latest attacks was also recently attacked by Elfin/APT 33, an Iranian threat group that has been targeting aerospace and energy-sector targets. The proximity of the two attacks makes it possible the two campaigns are linked, Chien says.

The Hunt for Motives
At this time it's unclear why the companies were targeted and how the attackers are distributing Shamoon and the new Fireraser component. Chien describes Filerase as deleting files in [ROOT_DRIVE]\Users and on other drives that are less than 100 MB in size.

Once Filerase infects one system, it spreads across the victim network using a list of targeted systems and another tool called Spreader.exe. The list, in the form of a text file, is specific to each victim and suggests that the attackers likely gathered the information from previous reconnaissance activity on the network, Symantec said. Once Filerase has been successfully copied on all computers in the attacker's list, the Spreader component simultaneously triggers it on the systems.

Symantec says it is possible that Shamoon itself was spread via the same mechanism on the impacted networks. "In at least one instance, Shamoon was executed using PsExec, indicating that the attackers had access to credentials for the network," the company says in its report.

Baan Alsinawi, president and founder of risk management firm TalaTek, says that based on publicly available information about the attack on Saipem, there's a good possibility the attackers had physical access to the Italian company's systems. "The lack of a network component and a command-and-control center, as described, suggested the attacker had installed the malware manually and set a time for it to propagate" she says.

So while it is bad the attackers were able to inflict damage, if they first needed physical access, their ability to impact other companies is going to be somewhat limited, Alsinawi says. Gaining physical access, and likely needing escalated privileges, is a higher bar to achieve in these types of attacks, she says.

This is not the first time Shamoon has resurfaced after disappearing. "We've now seen the malware taken out of retirement every few years," Chien says. After first emerging in 2012 and being used a series of very disruptive attacks against Saudi Aramco and other Saudi energy companies, the malware went dormant before making a comeback in late 2016, he notes.

"With the introduction of this most recent iteration, organizations need to remain vigilant and ensure that all data is properly backed up and a robust security strategy is in place," Chien says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13157
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...