SlideShare a Scribd company logo
1 of 20
Shamoon Attack
Angela Kozma, David Vera,
Justin Baker, Nur Jahed, Tyler Whittaker
Agenda
● What is Shamoon
● Attackers
● Target
● Vulnerability
● Motivation
● Approach
● Dropper
● Wiper
● Reporter
● Shamoon 2
● Outcome
● Prevention and recovery
● Exploit
● Conclusion
What is the Shamoon Attack?
● Malware that attacked newly updated 32 bit Windows NT
kernels.
● At the time the malware was distinct from other viruses
due to its destructive nature
● The virus was simply designed to cause maximum
devastation to the target- Saudi Aramco
● The Shamoon Attack was carried out twice, once in 2012 &
2016
Attackers
● Cutting Sword of Justice
● Have not been caught or identified
● Sent a phishing email that contained a bad link
which allowed the hackers to gain access
Target
● Saudi Arabian Oil Company, also known as Saudi
Aramco
● Have the 2 largest oil reserve in the world
○ Supply 10% of the world's oil
● 10.53 million barrels of oil per day
Vulnerability
● Admin passwords was already known
● Email contained malicious link
● Most staff was on holiday
● Windows User Access Control exploited
● Registry modified
● Network allowed worm to spread
Motivation
● Act of Cyber Activism
● Fed up with Al Saud Regime oppression against other
countries
● One theory is that the attacks are retaliatory measures
against the U.S. for:
○ Stuxnet, the U.S-Israeli backed malware that disrupted
Iran’s nuclear enrichment program
○ Payback for the severe U.S.-imposed sanctions that have
sent the Iranian economy into a tailspin.
Motivation Cont.
● The other theory suggests that the attack was highly
motivated by the “deep-wrath”, against the Saudi
Government because of:
● The Saudi government’s assistance to Sunni(denomination
of Islam) factions in Syria and Bahrain.
● The mistreatment of the Shiites(other denomination of
Islam) by Saudi Aramco.
Approach
● Shamoon used a destructive malware to wipe data from about
30,000 machines and prevented the machines from rebooting
● The worm-like malware that was used, corrupted files on a
compromised computer and it overwrote the Master Boot Record
(MBR) to make an effort to make the computer unusable
Approach Cont.
● At the time of the initial attack it was thought Shamoon was a
copycat attack that mimicked Wiper
● Three components that Shamoon has used were:
○ Dropper
○ Wiper
○ Reporter
Dropper
● Main area where the original infection starts (The main
component of the attack)
● How it works:
1. Copies itself onto the system and will drop files embedded
into resources
2. Also, make copies of itself on shared networks
3. Create a task to execute itself whenever Windows starts
Wiper
● Responsible for the destructive functionality of the threat that is
being placed
● How it works:
1. Deletes existing driver from certain locations and overwrites
them with another real driver
2. Then executed commands that collect file names, which gets
overwritten and becomes useless to the users
3. The MBR will get overwritten so that the computer can no
longer start
Reporter
● Reports infection data back to the attack
○ Ex: domain name, the number of files that
were overwritten, and the IP address of the
compromised computer
Shamoon 2.0 Approach
● The approach for Shamoon 2.0 is very similar, but the
technology is more advanced
● 90% of the original code used in Shamoon is being reused
○ But comes with a fully functional ransomware module
○ Common wiping functionality
○ Installs a legitimate-looking driver
● Dropper and Wiper are the same expect the final part of the
attack was completely automated
Shamoon Attack
Outcome
● Aramco was forced to shut down corporate network
○ Trucks were turned away since electronic payment was
down
● The attack could have been much worse
○ No drops of oil
● Five months later a new secured computer network and an
expanded cyber security team was implemented
Prevent an attack and
Recovery
● Ensure privileges are given to the right people
● Email and web browsing is a huge vulnerability
● Don’t let your guard down
● Network firewall rules
● 3,2,1 backup rule
● Access internal threats
Exploit
Conclusion
● Wakeup call for Saudi Arabian Oil Company
● Attacker was able to gain access, read, and destroy data
● Took 5 months to fully recover
References
Alelyani, S., & Kumar, H. (n.d.). Overview of Cyberattack on Saudi Organizations. Retrieved from
https://journals.nauss.edu.sa/index.php/JISCR/article/view/455
Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid.
Electricity Information Sharing and Analysis Center (E-ISAC).
Mills, E. (2018). Saudi Oil firm says 30,000 computers hit by virus. Retrieved from
https://www.cnet.com/news/saudi-oil-firm-says-30000-computers-hit-by-virus/
Pagliery, J. (2015, August 5). The inside story of the biggest hack in history. Retrieved November 5,
2018, from https://money.cnn.com/2015/08/05/technology/aramco-hack /index.html
Perlroth, N. (2012, October 24). In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.
Retrieved November 13, 2018, from
https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-
us.html
Saudi Arabia Crude Oil Production:. (n.d.). Retrieved November 12, 2018, from

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines
 
System hacking
System hackingSystem hacking
System hacking
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Personal security
Personal securityPersonal security
Personal security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Malware
MalwareMalware
Malware
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 

Similar to Team 3 project

Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
Aitezaz Mohsin
 

Similar to Team 3 project (20)

What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars - ESC Boston 2018
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draft
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 

Recently uploaded (20)

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Lect.1: Getting Started (CS771: Machine Learning by Prof. Purushottam Kar, II...
Lect.1: Getting Started (CS771: Machine Learning by Prof. Purushottam Kar, II...Lect.1: Getting Started (CS771: Machine Learning by Prof. Purushottam Kar, II...
Lect.1: Getting Started (CS771: Machine Learning by Prof. Purushottam Kar, II...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 

Team 3 project

  • 1. Shamoon Attack Angela Kozma, David Vera, Justin Baker, Nur Jahed, Tyler Whittaker
  • 2. Agenda ● What is Shamoon ● Attackers ● Target ● Vulnerability ● Motivation ● Approach ● Dropper ● Wiper ● Reporter ● Shamoon 2 ● Outcome ● Prevention and recovery ● Exploit ● Conclusion
  • 3. What is the Shamoon Attack? ● Malware that attacked newly updated 32 bit Windows NT kernels. ● At the time the malware was distinct from other viruses due to its destructive nature ● The virus was simply designed to cause maximum devastation to the target- Saudi Aramco ● The Shamoon Attack was carried out twice, once in 2012 & 2016
  • 4. Attackers ● Cutting Sword of Justice ● Have not been caught or identified ● Sent a phishing email that contained a bad link which allowed the hackers to gain access
  • 5. Target ● Saudi Arabian Oil Company, also known as Saudi Aramco ● Have the 2 largest oil reserve in the world ○ Supply 10% of the world's oil ● 10.53 million barrels of oil per day
  • 6. Vulnerability ● Admin passwords was already known ● Email contained malicious link ● Most staff was on holiday ● Windows User Access Control exploited ● Registry modified ● Network allowed worm to spread
  • 7. Motivation ● Act of Cyber Activism ● Fed up with Al Saud Regime oppression against other countries ● One theory is that the attacks are retaliatory measures against the U.S. for: ○ Stuxnet, the U.S-Israeli backed malware that disrupted Iran’s nuclear enrichment program ○ Payback for the severe U.S.-imposed sanctions that have sent the Iranian economy into a tailspin.
  • 8. Motivation Cont. ● The other theory suggests that the attack was highly motivated by the “deep-wrath”, against the Saudi Government because of: ● The Saudi government’s assistance to Sunni(denomination of Islam) factions in Syria and Bahrain. ● The mistreatment of the Shiites(other denomination of Islam) by Saudi Aramco.
  • 9. Approach ● Shamoon used a destructive malware to wipe data from about 30,000 machines and prevented the machines from rebooting ● The worm-like malware that was used, corrupted files on a compromised computer and it overwrote the Master Boot Record (MBR) to make an effort to make the computer unusable
  • 10. Approach Cont. ● At the time of the initial attack it was thought Shamoon was a copycat attack that mimicked Wiper ● Three components that Shamoon has used were: ○ Dropper ○ Wiper ○ Reporter
  • 11. Dropper ● Main area where the original infection starts (The main component of the attack) ● How it works: 1. Copies itself onto the system and will drop files embedded into resources 2. Also, make copies of itself on shared networks 3. Create a task to execute itself whenever Windows starts
  • 12. Wiper ● Responsible for the destructive functionality of the threat that is being placed ● How it works: 1. Deletes existing driver from certain locations and overwrites them with another real driver 2. Then executed commands that collect file names, which gets overwritten and becomes useless to the users 3. The MBR will get overwritten so that the computer can no longer start
  • 13. Reporter ● Reports infection data back to the attack ○ Ex: domain name, the number of files that were overwritten, and the IP address of the compromised computer
  • 14. Shamoon 2.0 Approach ● The approach for Shamoon 2.0 is very similar, but the technology is more advanced ● 90% of the original code used in Shamoon is being reused ○ But comes with a fully functional ransomware module ○ Common wiping functionality ○ Installs a legitimate-looking driver ● Dropper and Wiper are the same expect the final part of the attack was completely automated
  • 16. Outcome ● Aramco was forced to shut down corporate network ○ Trucks were turned away since electronic payment was down ● The attack could have been much worse ○ No drops of oil ● Five months later a new secured computer network and an expanded cyber security team was implemented
  • 17. Prevent an attack and Recovery ● Ensure privileges are given to the right people ● Email and web browsing is a huge vulnerability ● Don’t let your guard down ● Network firewall rules ● 3,2,1 backup rule ● Access internal threats
  • 19. Conclusion ● Wakeup call for Saudi Arabian Oil Company ● Attacker was able to gain access, read, and destroy data ● Took 5 months to fully recover
  • 20. References Alelyani, S., & Kumar, H. (n.d.). Overview of Cyberattack on Saudi Organizations. Retrieved from https://journals.nauss.edu.sa/index.php/JISCR/article/view/455 Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC). Mills, E. (2018). Saudi Oil firm says 30,000 computers hit by virus. Retrieved from https://www.cnet.com/news/saudi-oil-firm-says-30000-computers-hit-by-virus/ Pagliery, J. (2015, August 5). The inside story of the biggest hack in history. Retrieved November 5, 2018, from https://money.cnn.com/2015/08/05/technology/aramco-hack /index.html Perlroth, N. (2012, October 24). In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. Retrieved November 13, 2018, from https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets- us.html Saudi Arabia Crude Oil Production:. (n.d.). Retrieved November 12, 2018, from