- African states 'dangerously under-equipped' to deal with security needs defenceiq.com/naval-and-mari… https://t.co/EvRQpLWqwX 19 hours ago
- Ukraine close to acquiring combat unmanned ground vehicle defenceiq.com/armoured-vehic… https://t.co/hiFSUhvz9t 1 day ago
- RT @NavyLookout: Russia Black sea Fleet AGI (Spy ship) Liman sunk off Turkish coast after collision with a freighter in fog https://t.co/i… 1 day ago
- RT @AirbusDefence: 1st @EjercitoAire #A400M arrives at @FAMEXTweet for static display for rest of the week https://t.co/9F6dn8BmRu 2 days ago
- RT @Reuters: French intelligence report says Assad forces behind April 4 sarin attack reut.rs/2q6dRKl 2 days ago
We are the IQ of global defence.
Iran “not responsible” for Shamoon malware
January 22, 2013Posted by on
Following recent indications that the Shamoon virus (aka Disstrack) that targeted and disrupted about 30,000 Saudi Aramco workstations last year was “worse than originally believed”, new information has been dropped onto the desk at Defence IQ.
John Bumgarner, Chief Technology Officer at the U.S. Cyber Consequences Unit, has forwarded a summary report on the Unit’s research findings that suggest a more likely source to be an extremist Islamist group based in Saudi Arabia – or at the least, not an Iranian hacker, as initially suspected.
While the findings are still circumstantial and could of course have been designed to throw forensic analysts off the scent, the evidence at hand is compelling.
The report was initially circulated at the end of last year to a number of government agencies but has been made public for the first time to Defence IQ, entitled Decapitating Saudi Aramco with the Sword of Justice.
Bumgarner will be speaking at the annual Cyber Defence & Network Security (CDANS) conference in London next week, where a number of senior government and military personnel will be joining commercial solution providers, academia and others to discuss faster progress in this field.
Find out how to attend here.