- A look back at the #WannaCry blame game defenceiq.com/cyber-defence/… 8 hours ago
- RT @XStephenson: Honoured to have Admiral Leiva, Commander-in-Chief of the @Armada_Chile at the opening of @DefenceIQ Warships and OPV LATA… 8 hours ago
- Involved in armoured vehicles? We'd love your insight for this year's market survey... defenceiq.com/armoured-vehic…… twitter.com/i/web/status/8… 9 hours ago
- Construction to begin next year - target for 28 LCS at sea by 2023 twitter.com/Austal_USA/sta… 15 hours ago
- Not all bad news for the Aussies - new G550 AISREW fleet on the way twitter.com/GarethJennings… 16 hours ago
We are the IQ of global defence.
Iran “not responsible” for Shamoon malware
January 22, 2013Posted by on
Following recent indications that the Shamoon virus (aka Disstrack) that targeted and disrupted about 30,000 Saudi Aramco workstations last year was “worse than originally believed”, new information has been dropped onto the desk at Defence IQ.
John Bumgarner, Chief Technology Officer at the U.S. Cyber Consequences Unit, has forwarded a summary report on the Unit’s research findings that suggest a more likely source to be an extremist Islamist group based in Saudi Arabia – or at the least, not an Iranian hacker, as initially suspected.
While the findings are still circumstantial and could of course have been designed to throw forensic analysts off the scent, the evidence at hand is compelling.
The report was initially circulated at the end of last year to a number of government agencies but has been made public for the first time to Defence IQ, entitled Decapitating Saudi Aramco with the Sword of Justice.
Bumgarner will be speaking at the annual Cyber Defence & Network Security (CDANS) conference in London next week, where a number of senior government and military personnel will be joining commercial solution providers, academia and others to discuss faster progress in this field.
Find out how to attend here.