3、安全厂商发现Shamoon2变种针对虚拟化产品
标题:Shamoon 2 Variant Targets Virtualization Products
作者信息:January 10, 2017 By Eduard Kovacs
//BEGIN
A second variant of the Shamoon 2 malware discovered by researchers at Palo Alto Networks has been set up to target virtualization products, likely in an effort to increase the impact of the attack and make recovery more difficult for targeted organizations.
Shamoon, aka Disttrack, is a disk-wiping malware that became widely known in 2012, when it damaged 35,000 computers belonging to Saudi Arabian petroleum and natural gas company Saudi Aramco. A newer version of the threat, dubbed Shamoon 2, was recently used to target various organizations in the Persian Gulf, including Saudi Arabia’s General Authority of Civil Aviation (GACA), which has downplayed the impact of the attack.
彻底删除虚拟化产品的硬盘数据的恶意木马Shamoon2出现变种了,这些删除动作是直接针对磁盘级别,使得受侵害目标恢复其系统变得更难,影响更深远。其实从2012年就已经开始流行了,当时主要针对的就是沙特的石油和天然气公司的35000台计算机。新版本的变种则是该国的另外一个部门:民航总局。
//END
“VDI solutions can provide some protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems. Also, since FusionCloud systems run a Linux operating system, which would not be susceptible to wiping by the Windows-only Disttrack malware, this could be seen as a reasonable countermeasure against attacks like Shamoon,” Palo Alto Networks’ Robert Falcone wrote in a blog post.
“However, if the attacker was able to log into the VDI management interfaces using the account credentials they could manually carry out destructive activities against the VDI deployment, as well as any snapshot,” Falcone added.
该木马针对的虚拟化产品是来自中国华为公司的虚拟桌面构架产品VDI,其具体是FusionCloud。 由于FusionCloud的构架是基于Linux,而Shamoon 2恶意代码则是针对Windows 系统而言的,因此该因素会天然会有阻力因素。不过,由于虚拟化产品的默认登录口令会被恶意软件作者轻易获取,因此要想达到其破坏目的,这些恶意作者还是有很多招的。
点评:不赶时髦,不勒索,直接格掉硬盘。这个木马危害大呀。 |