Second Middle Eastern Utility Hit By Malware Attack

  /     /     /  
Publicated : 22/11/2024   Category : security


Second Middle Eastern Utility Hit By Malware Attack


Qatar gas company hack similar pattern as that of Saudi Arabian oil company -- shades of Shamoon?



Qatar’s RasGas -- one of the largest natural gas producers in the world -- is the latest Middle Eastern utility this month to suffer a major malware attack that took down some of its internal systems.
According to a Reuters report
, RasGas detected an unknown virus on its office computers on Monday, and its website and email servers appeared to be offline as well.
The attack is eerily reminiscent of the one experienced this month by Saudi Aramco,
which spread to 30,000 of the massive oil companys workstations
-- the same number quoted by the attackers who took responsibility for the attack and gave a hat tip to Shamoon malware research in an online post. Neither Saudi Aramco nor security researchers who have studied the malware in the oil company attack would confirm the connection, but one source with knowledge of the attacks confirmed that the attack on Saudi Aramco was Shamoon. Like Saudi Aramco, RasGas said its production systems were not hit in the attack. Operational systems both onsite and offshore are secure and this does not affect production at the Ras Laffan Industrial City plant or scheduled cargoes, the company said in a statement reported by Reuters.
Its unclear whether the RasGas attacks came from Shamoon. Some security experts say Shamoon is part of a wider campaign of attacks than was first believed. Shamoon isnt your typical targeted attack: Its not all about spying or stealing information, but instead its aimed at total annihilation of the data and machines.
Shamoon, a.k.a. W32.Disttrack, not only trashes files, but also overwrites the systems Master Boot Record (MBR) to disable the computer altogether. Its made up of three components: a dropper that also unleashes other modules; a wiper that performs the destruction element of the attack; and a reporter, which reports the progress of the attack back to the attacker. The wiper component deletes the existing driver and overwrites the signed one.
Speculation has run high over who is behind the Shamoon attacks, everything from a traditional hacktivist group to the Iranian government.
ICS-CERT yesterday issued
Website
and alert on Shamoon. Because of the highly destructive functionality of the Shamoon “Wiper” module, an organization infected with the malware could experience operational impacts including loss of intellectual property (IP) and disruption of critical systems. Actual impact to organizations vary, depending on the type and number of systems impacted, the alert says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Second Middle Eastern Utility Hit By Malware Attack