Shamoon virus

Shamoon is a dangerous malware program used in cyber warfare, and was first seen in attacks on the Saudi energy sector in 2012. Shamoon is a weaponized malware that uses a combination of components to infect computers, including the dropper, wiper, and reporter. The dropper creates a persistent service on the infected computer and copies itself to other network-attached computers, spreading its malicious code. The wiper drops a third component, which overwrites the hard disk’s master boot record with an embedded image in the malware, making the system unusable. The reporter establishes communication with a command and control server.

To protect your network against Shamoon, it's important to constantly monitor your network for intrusions. With a SIEM solution, you can detect malicious intrusions in real time. Mapping your security solution with the MITRE ATT&CK matrix can help you detect malware activity, communicate with a command-and-control server, and spot data exfiltration attempts. It's also important to utilize up-to-date antivirus software, regularly patch your systems, and educate your employees on identifying phishing emails and suspicious activity. Watch the video to learn more—three minutes is all it takes!

  • &nsbp;

    Conti ransomeware

    Conti is a ransomware-as-a-service affiliate program associated with...

    3.00

     
  • &nsbp;

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j...

    3.00

     
  • &nsbp;

    US government probes...

    On April 29, 2022, the United States government...

    3.00

     
  • &nsbp;

    Qakbot malware

    First discovered in 2007, Qakbot is widespread malware used for stealing information...

    3.00

     
  • &nsbp;

    Emotet malware

    Originally developed as a banking trojan in 2014, Emotet malware was...

    3.00

     
  • &nsbp;

    Cobalt Strike

    Created in 2012 by Raphael Mudge, Cobalt Strike is a remote...

    3.00

     
  • &nsbp;

    Mimikatz

    Mimikatz is an open source application that allows users to view and save...

    3.00

     
  • &nsbp;

    REvil Ransomware

    Belonging to the Cryptomix ransomware family, Clop ransomware...

    3.00

     
  • &nsbp;

    TrickBot

    Originally designed by a group of sophisticated cybercriminals as a banking...

    3.00

     
  • &nsbp;

    Colonial Pipeline attack

    Colonial Pipeline, a jet fuel and gasoline provider for the eastern United...

    3.00

     
  • &nsbp;

    Clop ransomware

    A California-based information security and compliance firm, Qualys,...

    3.00

     
  • &nsbp;

    Mirai malware

    Mirai malware infects devices that run on the ARC processor, turning...

    3.00

     
  • &nsbp;

    IcedID Malware

    IcedID, aka BokBot, is a banking trojan-type malware that can be used...

    3.00

     
  • &nsbp;

    SocGholish

    SocGholish is an initial access threat that uses drive-by-downloads that...

    3.00

     
  • &nsbp;

    Agent Tesla

    First discovered in 2014, Agent Tesla is an advanced Remote Access...

    3.00

     
  • &nsbp;

    Shlayer Malware

    First discovered in 2018, Shlayer malware has become one of the most...

    3.00

     
  • &nsbp;

    Gameover Zeus

    Identified in September 2011, GameOver Zeus is a peer-to-peer (P2P) variant...

    3.00

     
  • &nsbp;

    LokiBot

    First discovered in 2016, LokiBot is infostealing malware that...

    3.00

     
  • &nsbp;

    NanoCore

    Sold in underground forums, the NanoCore remote access Trojan...

    3.00

     
  • &nsbp;

    Man-in-the-middle attacks

    Man-in-the-middle (MitM) attacks take place...

    3.00

     
  • &nsbp;

    GandCrab ransomware

    GandCrab ransomware encrypts victims files...

    3.00

     
  • &nsbp;

    FormBook malware

    FormBook is an infostealer malware that steals...

    3.00

     
  • &nsbp;

    Lapsus ransomware

    Lapsus is a hacking group that gained noto...

    3.00

     
  • &nsbp;

    njRAT trojan

    The njRAT, also known as Bladabindi, is...

    3.00

     
  • &nsbp;

    Phorpiex botnet

    The Phorpiex Botnet, initially a worm...

    3.00

     
  • &nsbp;

    HawkEye keylogger

    HawkEye keylogger is a formidable...

    3.00

     
  • &nsbp;

    Teslacrypt

    TeslaCrypt is a ransomware variant...

    3.00

     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  • US
  • By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

© 2025 Zoho Corporation Pvt. Ltd. All rights reserved.

Back to Top