StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Issues That Led to Shamoon Incident at Aramco - Case Study Example

Cite this document
Summary
The paper "Network Issues That Led to Shamoon Incident at Aramco" tells that Shamoon affected many companies but its success in Aramco rates at 75% of the company’s computers (Norman ASA, 2012, p.1). This was the first malware used by the hacktivism front…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Network Issues That Led to Shamoon Incident at Aramco
Read Text Preview

Extract of sample "Network Issues That Led to Shamoon Incident at Aramco"

? Shamoon Incident at Aramco 30th, November, Network Issues That Led To Shamoon Incident at Aramco Saudi Aramco is the world's largest single energy-sector organization that exports crude oil and the reference government claims ownership. Major antivirus companies like Kaspersky named the virus that affected this company as "Shamoon." The main aim of the attack was to destroy files, data, erase their hard drives, and cripple the infected machines that it succeeded. Indeed, Shamoon affected many companies but its success in Aramco rates at 75% of the company’s computers (Norman ASA, 2012, p.1). This was the first malware used by the hacktivism front and hence the company’s network was not in a position to handle the complexity of this virus. Indeed, unlike other malware whose impact cannot overcome the antivirus set in the company’s network, the technology used in Aramco was way below that of the hackers. The network system in Aramco offers security to theft of data but has no capacity to handle annihilation manifested by Shamoon. In addition, the company’s anti-hacking and firewall software is incapable to deal with such technologically advanced malware like Shamoon. Moreover, the company’s IT and computer systems policies require a review. Sadly, the network system of Aramco allows multiple users to access both unclassified and classified information at the same time, which jeopardizes the security of the system as seen in the Shamoon attack. In addition, Aramco’s network allows its employees and expatriate employees to run information systems and then divulge such information that acts as leeway to cyber-attacks. Indeed, the company needs to review and update its IT policies and computer systems for purposes of dealing with such complicated malware as Shamoon (Mashat, 2012, p.1). Otherwise, the ease to access, lack of proper authorization, and use of ancient anti-hacking and firewall software, jeopardizes the security of Aramco’s network system. How the Attack Happened One group of hackers has claimed responsibility over the Shamoon attack on Aramco. The group, Cutting Sword of Justice asserts that the cyber-attack took place beginning Wednesday, Aug 15, 2012 at 11:08 AM and was complete within a few hours (Fisher, 2012, p.1). Although, this information is not certain, there are clear indications that lead to this assertion. Indeed, in the same day after Cutting Sword of Justice asserted this, Saudi Aramco confirmed that part of its computer system used by its employees is under cyber-attack courtesy of a computer virus. Alternatively, several antivirus vendors Kaspersky Lab, Symantec, McAfee confirmed the existence of such a virus and named it Shamoon or Disttrack (Higgins, 2012, P. 16). Indeed, the hackers took the virus from another computer package and dropped it off in the Aramco’s computer system. We may need to define the details of this virus to reinforce our understanding on how this attacked happened. Shamoon or Disttrack is a legitimate software driver with a digital signature inside its package. Specifically, the virus is referred to as W32. Disttrack and ha distinct security components. Indeed, W32.Disttrack has a dropper that played a major role in creating and providing the original infection. Subsequently, the dropper significantly dropped other modules in initiating the attack. In addition, the W32.Disttrack has a wiper whose main responsibility in the attack was to destroy the network of target system, Aramco. Moreover, the wiper has the capability to enable user-mode applications to read and write to disk sectors of other systems (Secretary of Defense Leon E. Panetta, 2012, n. p). As such, it is most applicable in overwriting the computer's Master Boot Record. Indeed, the wiper deleted all the existing drivers and overwrote the signed one in Aramco’s network. Most significantly, the W32.Disttrack entails a reporter, which was significant in reporting the success of the attack to the attacker. The reporter takes back all the details relating to the domain name, the number and names of files overwritten, and the IP address of the destroyed computer. As such, the Shamoon trashed all the files, overwrote the system's Master Boot Record (MBR), and consequently disabled the computer from the established network. This happened as the Shamoon looked for and destroyed all downloads, pictures, documents, music, and video files in the Aramco’s computer system. After the successful attack, W32.Disttrack sent all the stolen files to a remote control center in the attackers system. This attack led to a public debate and a possible review of Aramco’s computer system. However, only the internet-connected computers suffered the attack. Statistically, about 30,000 (King, 2012, n. p) of Aramco’s 50,000 computers crashed making the Shamoon attack the greatest cyber-attack in Saudi Arabia. How the Virus Went Through Their Network As seen herein, Shamoon has advanced and distinct set of capabilities that enabled it to go through the Aramco’s network and cause an attack of such magnitude. Assuredly, the virus accessed the network system of Aramco using the hacked systems in several countries (Timothy, 2012, p. 1). Subsequently, the hackers sent the malware to destroy the exposed and networked computers at Aramco Company. Notably, the virus used the destroyed computers in Aramco’s network as a kind of proxy server to gather data stolen from the destroyed computers. Furthermore, the attacker controlled the internal machine with a direct connection to the internet. Subsequently, the attacker used the internet-connected internal machine as a proxy to the external Command-and-Control (C2) server (Fisher, 2012, p.1). Hence, through this proxy, the attacker gained access to other internal machines that did not have a direct internet connection and destroyed them wholesomely. The ability of the virus to overwrite the master boot record of infected machines after stealing data was significant at this level. Hence, the virus used the wiper component to execute the instructions to delete the data on the hard disk and overwrite the Master Boot Record thus destroying the Aramco’s network. Moreover, the attacker used the local network to retrieve and the internal proxy to send the stolen data to the command-and-control servers of the attacker.  As a result, Shamoon went through Saudi, Aramco’s network and subsequently destroyed a significant number of computers. Works Cited Fisher, D (2012) Some Signs Point to Shamoon as Malware in Aramco Attack, Accessed 30th November 2012, http://threatpost.com/en_us/blogs/some-signs-point-shamoon-malware-aramco-attack-082212 Higgins, K.J. 2012, "New Attack's Mode Of Operation Is Data Sabotage, Not Theft", InformationWeek, , no. 1342, pp. 16-16. King, R. 2012, Virus Aimed at Iran Infected Chevron's Computer Network, New York, N.Y., United States, New York, N.Y. Mashat, M (2012) What Saudi Aramco can learn from the Shamoon virus attack, Accessed 30th November 2012, http://www.saudigazette.com.sa/index.cfm?method=home.regcon&contentid=20120827134105 Norman ASA Security Experts Available to Discuss Saudi Aramco Hacking Incident, New Shamoon Malware 2012, New York, United States, New York. Secretary of Defense Leon E. Panetta Delivers Remarks on Cyber security to the Business Executives for National Security 2012, , Lanham, Lanham. Timothy (2012) Shamoon Malware Linked To Saudi Aramco Attack, Accessed 30th November 2012, http://it.slashdot.org/story/12/08/25/0535221/shamoon-malware-linked-to-saudi-aramco-attack Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Shamoon incident at Aramco Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Shamoon incident at Aramco Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1463695-shamoon-incident-at-aramco
(Shamoon Incident at Aramco Case Study Example | Topics and Well Written Essays - 1000 Words)
Shamoon Incident at Aramco Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1463695-shamoon-incident-at-aramco.
“Shamoon Incident at Aramco Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1463695-shamoon-incident-at-aramco.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Issues That Led to Shamoon Incident at Aramco

Public Relation Crisis

This essay Public Relations Crisis talks that the concept of public relation originated more than thousand years ago.... It was mainly developed by the Greeks.... They used words such as ‘sematikos' which means semantics and such words were used to make people believe certain things.... .... ... ...
10 Pages (2500 words) Essay

Kunsthaus Bregenzs Cultural Context

uch issues as the use of proper construction materials, the tuning of a building's organization strategy to the need of producing specific visual effects, and so forth are thus to be frequently touched upon in the present study.... The paper "Kunsthaus Bregenzs Cultural Context" discusses that unlike the massive concrete inner walls of the higher levels, the light-infused glass walls of the ground floor contribute to significant changes in perception for the visitor entering the Kunsthaus for the first time....
25 Pages (6250 words) Essay

Saudi Aramco Procurement Process

It will also attempt to analyze if hard system model befits Saudi aramco Company's procurement procedures.... Influence Diagram— also known as relevance analysis or a decision network illustrated graphical and mathematical representation in decision-making.... The millennium is characterized with information technology as instrument for world wide business expansion, networking and in engaging with business partners for sustainable operations....
13 Pages (3250 words) Essay

Saudi Aramco Against Major Performance Structures

Analysis of Saudi aramco Against Major Performance Structures Abdullah Adnan Algamdi, 220078861 MM324, Organisational Leadership and Performance Length: 2,563 Dr.... The research therefore employs the model prescribed by Hillgren & Morse to analyse the internal systems and structures of Saudi aramco that enables the company to maintain its current capacity of producing 12 million barrels of petroleum (Saudi aramco Annual Report, 2010 p6) each day and also refine, transport and market a similar volume of oil each day....
10 Pages (2500 words) Essay

Comparison of Saudi Aramco and Shell

After the analysis of the two companies in the essay "Comparison of Saudi aramco and Shell," it is found that Saudi aramco leads a major share of the market and in fact is the largest energy company in the whole world.... The business approach adopted by Saudi aramco is different from the one Shell is using.... Saudi aramco is fixed on fulfilling the goals it has set for itself, as this helps it to focus on attracting the target group in the market....
20 Pages (5000 words) Essay

Analysis of Saudi Aramco and Marathon Petroleum Corporation's Websites

The paper "Analysis of Saudi aramco and Marathon Petroleum Corporation's Websites" is a great example of a research proposal on information technology.... I have 4 years of service experience with the Saudi French Bank, where I was responsible for handling various customer issues and providing suitable solutions The paper "Analysis of Saudi aramco and Marathon Petroleum Corporation's Websites" is a great example of a research proposal on information technology....
18 Pages (4500 words) Research Proposal

The Number of Nurses for the Safety and Better Care Towards Patients

Furthermore, restructuring has not only led to the dismissal or reduction of nurses but also registered nurses were replaced with aides.... The paper "The Number of Nurses for the Safety and Better Care Towards Patients" discusses that to solve the problem of the shortage of nurses and on giving quality care, there must be an explanation or information on the role of nurses in the community....
19 Pages (4750 words) Report

Awareness of Current Events: Saudi Aramco Attack

This case study "Awareness of Current Events: Saudi Aramco Attack" discusses a virus recognized as Shamoon that was deployed to Saudi Aramco in August 2012, infected workstations, deleting almost 75% of hard drive data of company computers at aramco, the world's leading oil and gas producers.... Cyber attack experts held the view that the attack trail of the Saudi aramco cyber-attack obviously pointed to managerial and confidential accounts as the precedence aims for assailants wanted to permeate and damage vital infrastructure....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us