2013
DOI: 10.2139/ssrn.2270860
|View full text |Cite
|
Sign up to set email alerts
|

Hack or Attack? Shamoon and the Evolution of Cyber Conflict

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 1 publication
0
10
0
2
Order By: Relevance
“…The attack was probably brought out by an insider, someone who got access to users' credentials and gained access to the domain controller (Wuuest, 2014). Although it was compared to Stuxnet, the perpetrators were described as "skilled amateurs", because of the inferior level of competence and programming skills detected by the authorities (Bronk, 2013). The type of attack in consideration is APT (Advanced Persistent Threat), meaning that the attackers have found the password hashes of the administrative accounts and gained the access to higher levels of the system (Alshathry, 2017).…”
Section: Examples Of Cyber-attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack was probably brought out by an insider, someone who got access to users' credentials and gained access to the domain controller (Wuuest, 2014). Although it was compared to Stuxnet, the perpetrators were described as "skilled amateurs", because of the inferior level of competence and programming skills detected by the authorities (Bronk, 2013). The type of attack in consideration is APT (Advanced Persistent Threat), meaning that the attackers have found the password hashes of the administrative accounts and gained the access to higher levels of the system (Alshathry, 2017).…”
Section: Examples Of Cyber-attacksmentioning
confidence: 99%
“…Saudi Aramco declared that, despite the wipe-out of data from the server, no physical disruption was recorded and the recovery of the company was complete (Alshathry, 2017). Nevertheless, the downtime of the organization's websites was recorded also after the declaration of complete recovery (Bronk, 2013).…”
Section: Examples Of Cyber-attacksmentioning
confidence: 99%
“…Em agosto de 2012, a empresa nacional de petróleo e gás da Arábia Saudita, Saudi Arabian Oil Company, ou Saudi Aramco, sofreu um ataque cibernético através de um vírus de computador apelidado de Shamoon que infectou até 30.000 computadores de plataforma Windows operando dentro da rede corporativa da empresa (Bronk et al: 2013).…”
Section: Saudi Aramcounclassified
“…The virus destroyed over 30,000 computers and disrupted oil and gas production for two weeks. 4 In a speech following the attack, then-Secretary of Defense Leon Panetta described the virus as the most destructive cyberattack against the business sector to date. 5 He warned that the United States could one day face a cyber Pearl Harbor.…”
mentioning
confidence: 99%