Shamoon 2.0

  • First known sample

  • Discovery

  • Current status

  • Type

    Data destroyer
  • Targeted platforms

  • TOP targeted countries

    Saudi Arabia
  • The way of propagation

    Access to network connections
  • Purpose/Functions

    Data wiping
  • Targets

    Government entities , Telecoms
  • Artefacts/Attribution
    Shamoon embeds Arabic-Yemen resource language sections.
  • Description

    First discovered at the end of November 2016, this wiper malware was a variant of the Shamoon worm first found in 2012. This highly destructive malware targeted organizations in various critical and economic sectors in Saudia Arabia, wiping the system once inside.

    Additional information