Shamoon (2012): Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(editing real world scenarios)
mNo edit summary
 
(5 intermediate revisions by 3 users not shown)
Line 1: Line 1:
''[This page is under construction. Sources to include: https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html]''
{| class="wikitable"
{| class="wikitable"
! scope="row"|Date
|+
|'''Date'''
|August 2012
|August 2012
|-
|-
|'''Suspected Actor'''
! scope="row"|Suspected Actor
|A group called 'Cutting Sword of Justice' claimed responsibility for the attack. Neither researchers nor officials have disclosed the names of the attackers involved. U.S. Intelligence officials say the attack’s real perpetrator was Iran, although they offered no specific evidence to support that claim.
|A group called 'Cutting Sword of Justice' claimed responsibility for the attack. Neither researchers nor officials have disclosed the names of the attackers involved. U.S. intelligence officials considered that the attack’s real perpetrator was Iran, although they offered no specific evidence to support that claim.<ref name="NYT">Nicole Perlroth, [https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html 'In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back'], New York Times (23 October 2012).</ref>
|-
|-
|'''Target'''
! scope="row"|Target
|The Shamoon virus was inserted into the networks of the state owned national oil company 'Saudi Aramco'.
|The Shamoon virus was inserted into the networks of the state owned national oil company 'Saudi Aramco'.
|-
|-
|'''Method'''
! scope="row"|Method
|The virus — called Shamoon after a word embedded in its code —was unleashed on the 15th of August by a a company insider with privileged access to Aramco’s network.
|The virus — called Shamoon after a word embedded in its code —was unleashed on 15 August 2012 by a a company insider with privileged access to Aramco’s network.
Instead of solely collecting information, the virus revealed its highly destructive nature as it rendered the infected computers unusable. Shamoon was designed to carry out two steps: it erased the data on the hard drives and replaced them with an image of a burning American flag; and it reported the addresses of infected computers back to a computer inside the company’s network. It also reported back on the number of files<ref>Dan Goodin, [https://arstechnica.com/information-technology/2012/08/shamoon-malware-attack/ 'Mystery malware wreaks havoc on energy sector computers'] ''Ars Technica'' (17 August 2012)</ref> and the list of files<ref>[https://www.bbc.com/news/technology-19293797 'Shamoon virus targets energy sector infrastructure'] ''BBC'' (17 August 2012)</ref> that it destroyed.

During that process, the erased files were overwritten with corrupted files so they could not be recovered.
Instead of solely collecting information, the virus revealed its highly destructive nature as it rendered the infected computers unusable. Shaman was designed to carry out two steps: It erased the data on the hard drives and replaced them with an image of a burning American flag and reported the addresses of infected computers back to a computer inside the company’s network.
Shamoon was able to spread from an infected machine to other computers on the network, so that over 30.000 computers of Aramco were infected.

During that process, the erased files are overwritten with corrupted files so they cannot be recovered.

Shamoon can spread from an infected machine to other computers on the network, so that over 30.000 computers of Aramco were infected.
|-
|-
|'''Purpose'''
! scope="row"|Purpose
|An online announcement of the attack seems to suggest that the group sees the attack as an act of retaliation against the Al-Saud regime for the crimes and atrocities taking place in various countries around the world, especially in the neighboring countries such as Syria, Bahrain, Yemen, Lebanon and Egypt.
|An online announcement of the attack seemed to suggest that the group saw the attack as an act of retaliation against the Al-Saud regime for the crimes and atrocities taking place in various countries around the world, especially in the neighboring countries such as Syria, Bahrain, Yemen, Lebanon and Egypt.
|-
|-
|'''Result'''
! scope="row"|Result
|Over 30.000 computers at Aramco were rendered useless and had to be replaced. The virus erased data on three-quarters of Aramco’s corporate PCs, such as documents, spreadsheets, e-mails and other important files.
|Over 30.000 computers at Aramco were rendered useless and had to be replaced. The virus erased data on three-quarters of Aramco’s corporate PCs, such as documents, spreadsheets, e-mails and other important files.
Aramco was forced to shut down the company’s internal corporate network, disabling employees’ e-mail and Internet access, to stop the virus from spreading.<ref name="NYT" />

According to Aramco, the core business of oil production and exploration was not affected by the attack, as they depend on isolated network systems unaffected by the attack.
Aramco was forced to shut down the company’s internal corporate network, disabling employees’ e-mail and Internet access, to stop the virus from spreading<ref>''https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html]''</ref>.

According to Armco, the core business of oil production and exploration was not affected by the attack, as they depend on isolated network systems unaffected by the attack.
|-
|-
|'''Aftermath'''
! scope="row"|Aftermath
|On the 29th of August the same attackers published a posting containing username and passwords of Armco accounts and of Aramco CEO Khalid Al-Falih proving they still retained access to the company network. At the end of August, Armco published a statement saying that it managed to restore all the main internal network services.
|On 29 August 2012, the same attackers published a posting containing username and passwords of Aramco accounts and of Aramco CEO Khalid Al-Falih proving they still retained access to the company network. At the end of August 2012, Aramco published a statement saying that it managed to restore all the main internal network services.
Although described as one of the most destructive attacks on the business sector so far, none of its authors has been identified or caught.

In 2016, a new variant of Shamoon, reportedly launched from Iran, struck multiple organizations in Saudi Arabia.<ref>Sean Gallagher, [https://arstechnica.com/information-technology/2016/12/shamoon-wiper-malware-returns-with-a-vengeance/ 'Shamoon wiper malware returns with a vengeance'] ''Ars Technica'' (02 December 2016)</ref>
Although described as one of the most destructive attacks on the business sector so far, none of its authors has been identified or caught.
|-
|-
|'''Analysed in'''
! scope="row"|Analysed in
|[[Scenario 10: Cyber weapons review]]
|[[Scenario 03: Cyber operation against the power grid|Scenario 03: Power grid]]<br>[[Scenario 10: Cyber weapons review]]

[[Scenario 3: Power grid]]
|}
|}
[[Category:Example]]
[[Category:Example]]
[[Category:2012]]

Latest revision as of 15:12, 17 September 2021

Date August 2012
Suspected Actor A group called 'Cutting Sword of Justice' claimed responsibility for the attack. Neither researchers nor officials have disclosed the names of the attackers involved. U.S. intelligence officials considered that the attack’s real perpetrator was Iran, although they offered no specific evidence to support that claim.[1]
Target The Shamoon virus was inserted into the networks of the state owned national oil company 'Saudi Aramco'.
Method The virus — called Shamoon after a word embedded in its code —was unleashed on 15 August 2012 by a a company insider with privileged access to Aramco’s network.

Instead of solely collecting information, the virus revealed its highly destructive nature as it rendered the infected computers unusable. Shamoon was designed to carry out two steps: it erased the data on the hard drives and replaced them with an image of a burning American flag; and it reported the addresses of infected computers back to a computer inside the company’s network. It also reported back on the number of files[2] and the list of files[3] that it destroyed. During that process, the erased files were overwritten with corrupted files so they could not be recovered. Shamoon was able to spread from an infected machine to other computers on the network, so that over 30.000 computers of Aramco were infected.

Purpose An online announcement of the attack seemed to suggest that the group saw the attack as an act of retaliation against the Al-Saud regime for the crimes and atrocities taking place in various countries around the world, especially in the neighboring countries such as Syria, Bahrain, Yemen, Lebanon and Egypt.
Result Over 30.000 computers at Aramco were rendered useless and had to be replaced. The virus erased data on three-quarters of Aramco’s corporate PCs, such as documents, spreadsheets, e-mails and other important files.

Aramco was forced to shut down the company’s internal corporate network, disabling employees’ e-mail and Internet access, to stop the virus from spreading.[1] According to Aramco, the core business of oil production and exploration was not affected by the attack, as they depend on isolated network systems unaffected by the attack.

Aftermath On 29 August 2012, the same attackers published a posting containing username and passwords of Aramco accounts and of Aramco CEO Khalid Al-Falih proving they still retained access to the company network. At the end of August 2012, Aramco published a statement saying that it managed to restore all the main internal network services.

Although described as one of the most destructive attacks on the business sector so far, none of its authors has been identified or caught. In 2016, a new variant of Shamoon, reportedly launched from Iran, struck multiple organizations in Saudi Arabia.[4]

Analysed in Scenario 03: Power grid
Scenario 10: Cyber weapons review
  1. 1.0 1.1 Nicole Perlroth, 'In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back', New York Times (23 October 2012).
  2. Dan Goodin, 'Mystery malware wreaks havoc on energy sector computers' Ars Technica (17 August 2012)
  3. 'Shamoon virus targets energy sector infrastructure' BBC (17 August 2012)
  4. Sean Gallagher, 'Shamoon wiper malware returns with a vengeance' Ars Technica (02 December 2016)