Shamoon Malware Re-Emerges With Attacks in Italy, Middle East

Over the last week, several reports emerged that the Shamoon malware, which was last seen in 2016, has re-emerged with attacks in Italy and the Middle East. This version includes a destructive data file wiper.

Scott Ferguson, Managing Editor, Light Reading

December 18, 2018

3 Min Read

Over the last week, several reports have found that the Shamoon malware has re-emerged, including attacks against oil and gas companies in Italy and the Middle East, following a two-year absence.

Additionally, security researchers have found that this version of Shamoon includes a destructive data wiper that can delete files from infected systems before the malware fully removes all the data from the Master Boot Record.

The first attack appears to have targeted Saipem, an Italian oil company, which announced the incident on December 10. Since then, the company has continued to recover, finding about 300 PCs infected with the malware.

Later, researchers at Symantec issued a December 14 report that found additional Shamoon attacks that targeted organizations in Saudi Arabia and the United Arab Emirates.

(Source: iStock)

(Source: iStock)

In the case of the incident involving Saipem, researchers with Palo Alto Network's Unit42 found that the attack involved Disttrack malware -- another name for Shamoon -- and that the sample they examined contained similarities between this one and others that happened in 2016, which are sometimes called Shamoon 2.

It's through this examination that researchers found the new wiping capabilities.

"Unlike past Shamoon attacks, this particular Disttrack wiper would not overwrite files with an image. Instead it would overwrite the MBR [Master Boot Record], partitions, and files on the system with randomly generated data," according to the Unit42 analysis.

In this case, Disttrack acts as a dropper in order to infect a PC and install the data wiper onto the system. However, researchers also found that the malware also helps spread the attack throughout the network by using stolen usernames and passwords to log into other computers.

Researchers also noted that the malware sample contained a specific wipe date of "12/7/2017," which would appear to be a mistake by the group. However, it can still be effective: "This older date is still effective as the Disttrack dropper will install and run the wiper module as long as the system date is after the wipe date," according to the report.

In its analysis, Symantec researchers found that the group behind the attack usually gathers these credentials during a reconnaissance phase before the main attack. This list is then copied first to a file called OCLC.exe and then sent to another tool by the name or Spreader.exe. This sequence then copies all the malware to as many computers as possible.

Symantec has its own name for this part of the attack called the Filerase Trojan.

During the recent attack, Symantec noted that between the malware's ability to spread through the network, combined with the wipe capabilities, this particular attack is difficult to recover from once it starts.

"While a computer infected by Shamoon could be unusable, files on the hard disk may be forensically recoverable. However, if the files are first wiped by the Filerase malware, recovery becomes impossible," according to the company's analysis.

In the case of this most recent attack, Symantec noted that one company targeted by Shamoon had also been a victim of another piece of malware called Stonedrill, which is used by an Advanced Persistent Threat group (APT) called Elfin or APT33. It's possible the two are related but researchers could not draw a direct link as of yet.

From a historical perspective, researchers first noted Shamoon in 2012, when it attacked the network of Saudi Aramco -- the largest oil producer in Saudi Arabia -- infecting about 30,000 machines and stopping work at the company for some time.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Read more about:

Security Now

About the Author(s)

Scott Ferguson

Managing Editor, Light Reading

Prior to joining Enterprise Cloud News, he was director of audience development for InformationWeek, where he oversaw the publications' newsletters, editorial content, email and content marketing initiatives. Before that, he served as editor-in-chief of eWEEK, overseeing both the website and the print edition of the magazine. For more than a decade, Scott has covered the IT enterprise industry with a focus on cloud computing, datacenter technologies, virtualization, IoT and microprocessors, as well as PCs and mobile. Before covering tech, he was a staff writer at the Asbury Park Press and the Herald News, both located in New Jersey. Scott has degrees in journalism and history from William Paterson University, and is based in Greater New York.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights