3、Shamoon组织使用恶意代码擦除目标主机
标题:Shamoon 2: Return of the Disttrack Wiper
作者信息:November 30, 2016 at 5:20 PM By Robert Falcone
//BEGIN
In August 2012, an attack campaign known as Shamoon targeted a Saudi Arabian energy company to deliver a malware called Disttrack. Disttrack is a
multipurpose tool that exhibits worm-like behavior by attempting to spread to other systems on a local network using stolen administrator credentials. More importantly, its claim to fame is the ability to destroy data and to render infected systems unusable. The attack four years ago resulted in 30,000 or more systems being damaged.
四年前的一个被称为Shamoon组织发布了一个带有蠕虫性质的恶意代码Disttrack,虽然时间过去这么久了,但是最近其又重新活动了。这个称为Disttrack的恶意代码是一个带有蠕虫性质、并能在内网中利用盗取的管理员账号感染其他机器和系统。最新的版本的Disttrack恶意代码据说能够损坏用户的数据并导致系统不能使用。4年前的攻击已经导致了3万个系统不能正常使用。
//END
After a four year hiatus, threat actors likely associated with the Shamoon attack campaign have used their Disttrack malware to target at least one
organization in Saudi Arabia. The current attack campaign has several TTP overlaps with the original Shamoon campaign, especially from a targeting and timing perspective. Also, Disttrack malware used in the recent attacks is very similar to the variant used in the 2012 attacks, which uses the exact same RawDisk device driver as well (down to the same, temporary license key).. The main purpose of the Disttrack malware is to overwrite files and storage partitions in an attempt to destroy data and render the system unusable. To maximize its destruction, the Disttrack tool attempts to spread to other systems on the network using stolen administrator credentials, which suggests that the threat actors had previous access to the network or carried out successful phishing attacks prior to the attack using Disttrack.
经过了四年蛰伏,Disttrack恶意代码至少将其的目标定位为一个来自沙特的组织。新发现的攻击与4年前的类似,表现在其采用的恶意代码相似以及攻击的时间段(休息的时间)选择,并采用了RawDislk的设备驱动程序,其主要的作用是覆盖目标一些有用文件,损坏数据同时导致系统不能正常启动。为了扩大其攻击范围,该恶意代码采用盗取的用户凭证,在感染的内网中横向移动,这显示该攻击组织先前已经采用其他方式攻陷过企业的内网。
点评:数据恢复是最后的手段,但是还是最好能做到事先防范。 |