Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Shamoon data-wiping malware believed to be the work of Iranian hackers
#1
Quote:A spate of recent attacks involving the Shamoon data-wiper malware family has been attributed to the Iranian hacking group APT33.

On Wednesday, the McAfee Advanced Threat Research team said APT33 -- or a group masquerading as APT33 -- is likely responsible for a recent campaign which targeted industrial players in the Middle East and Europe.

It was earlier this month that ZDNet learned of the Shamoon malware's presence on Italian oil and gas contractor Saipem's networks. The company operates across the Middle East, India, Italy, and Scotland.

McAfee said in a blog post that recent Shamoon-based campaigns have been detected not only targeting companies directly but has also been used in supply chain attacks.

Source: https://www.zdnet.com/article/shamoons-d...n-hackers/
[-] The following 2 users say Thank You to silversurfer for this post:
  â€˘ Der.Reisende, harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
VPN brand brings transparent toilet to t...
VPN provider Surfs...Rotem — 15:57
Movies! Movies!
Godzilla x Kong: T...jAcos — 13:44
Microsoft is testing Game Pass ads on th...
Look, another adve...harlan4096 — 11:23
Notepad++ 8.6.7
Notepad++ 8.6.7: ...harlan4096 — 09:23
GFYI [Official] Ashampoo Snap 16 Giveaw...
Thank you and congra...mjcn19 — 03:33

[-]
Birthdays
Today's Birthdays
avatar (36)owysykan
avatar (47)beautgok
Upcoming Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
avatar (37)axuben
avatar (38)ihijudu
avatar (43)tiojusop
avatar (40)Damiennug
avatar (38)acoraxe
avatar (47)contjrat
avatar (42)knigiJow
avatar (44)1stOnecal
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (38)GregoryRog
avatar (43)mediumog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>