website statistics

Security firms have discovered a new malware which is being named 'Shamoon.' Shamoon steals data from a machine and then tries to render it unusable.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Most malware in recent days have been intended as tools to steal financial information or other important data. We saw that in the case of Flame and the more recent Gauss malware. Now, security firms have discovered yet another malware which is not as sophisticated but it tries to make your computer unusable. It is being touted as ‘Shamoon.’


According to Symantec, Shamoon “is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable.” It’s rather intriguing for security researchers because most malware authors want to steal information, not to wreck the target machines.

Seculert, another security firm, provided a deeper insight into the workings of this malware. According to the firm, the first stage of the attack involves taking control of an internal machine and then hitching it up to an external Command-And-Control server. Once this is done, this infected machine is used to target other internal machines. In the second stage of the attack, Shamoon malware is released which then steals the data and overwrites MBR (Master Boot Record).

After looking into this new malware, Kaspersky noted, “Our opinion, based on researching several systems attacked by the original Wiper, is that it is not the same. The original ‘Wiper’ was using certain service names (‘RAHD…’) together with specific filenames for its drivers (‘%temp%\~dxxx.tmp’) which do not appear to be present in this malware. Additionally, the original Wiper was using a certain pattern to wipe disks which again is not used by this malware.”

Analysts believe that this malware is more the work of script kiddies who would create such a thing for the sheer fun of it. Any serious attacker wouldn’t want to make the target machine unusable.

Source: SecureList/ Seculert/ Symantec

Courtesy: PC Mag

Buy Cheapest Related Product From Amazon.com


D-Link Amplifi Cloud Router 5700 (DIR-865L)

You Can Also Build Mars Rover Curiosity Using LEGO Brick
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 18, 2012(1 year, 8 months ago.)

Recent Search

Recent Tutorials

Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook