HackDig : Dig high-quality web security articles for hackers

Second Wave of Shamoon 2: Disttrack Can Now Wipe Organizations’ VDI Snapshots

On November 17, 2016, the security community witnessed the resurgence of a familiar enemy. That’s the day when Shamoon 2, the successor of an attack campaign which first emerged in 2012, delivered Disttrack wiper malware to an organization based in Saudi Arabia.True to its design, Disttrack spread through the company’s network and overwrote the M
Publish At:2017-01-13 02:50 | Read:4566 | Comments:0 | Tags:Cyber Security Featured Articles Disttrack malware MBR Shamo

Shamoon 2: Nothing Whets Disttrack’s Appetite Like Destroyed Data

Most families of malware operate on a common assumption: a user’s data is valuable. For instance, some malware samples transmit pieces of a victim’s data to their command-and-control (C&C) server as means of setting up an attack, while others fully embrace the spyware classification and collect as much information about a user as possible. At
Publish At:2016-12-05 06:40 | Read:4924 | Comments:0 | Tags:Cyber Security Featured Articles Disttrack malware Shamoon W


Tag Cloud