Categories: MalwareSecurity

Iran suspected for the attack on the Saudi Aramco

Last week it was announced by Saudi Arabia’s oil company, Saudi Aramco that its systems and its internal network were victims of a cyber attack. Recently the company has given more info on the incident declaring that the systems are back up after the attack made by a virus that infected 30,000 work stations.

All the servers have been cleaned and restored and all the activities are back to normal on Saturday, the good news is that the production environment hasn’t been affected by the attack because they work with a totally isolated network, this information provided by the company indicates that the attack came through the Internet and not internal channels.

The company claims responsibility is of  “malicious virus that originated from external sources”, but the origin and the motivations behind the attack remain a mystery, due to these reasons all the internet access to internal resources has been re designed and restricted.

What is interesting is that the company hasn’t referred the group of hackers who claimed responsibility for the hack, Kalid A. Al-Falih, president and CEO of Saudi Aramco, said:

“Saudi Aramco is not the only company that became a target for such attempts, and this was not the first nor will it be the last illegal attempt to intrude into our systems, and we will ensure that we will further reinforce our systems with all available means to protect against a recurrence of this type of cyber-attack,”

Several groups have claimed to have attacked the company such as the “Cutting Sword of Justice” and the “Arab Youth Group”. The group named Cutting Sword of Justice claimed the attack on Pastebin site announcing to have sent the virus to destroy 30,000 computers of the company responsible for support for “crimes and atrocities” against citizens in Syria, Egypt, Lebanon and other countries in the area.

According an article published by the Jeffrey Carr, CEO of Taia Global, the Arab Youth Group, uses terms like “evil Al-Saud” and “Al-Saud traitors” and specifically refers to Lebanon and the Forqan War (aka Operation Cast Lead 12/2008-1/2009) which at least one Iranian hacker crew – the Ashiyane Security Group – participated in.

The second group, the Cutting Sword of Justice, posted several messages containing proof of the attack such as the list of compromised IP addresses of servers. analyzing the way they wrote the posts it is possible to note that they haven’t made religious proclamations and have focused the statements on a political concept like “tyranny”.

What is singular is that they also posted the start date and time which corresponds to the code string found in Shamoon malware, a virus used not only with the intent to spy on victims but to destroy them making the machine unusable. According to the expert the two group appear separated and are the mainly responsible for the attack.

According Carr, the Hezbollah, a Shi’a militant group based in Lebanon, is really close to Iran receiving financial and political support from the government of Teheran. Hezbollah includes in its ranks hackers maybe recruited to be involved in cyber operations like this.

According to this Arabic website, up to 70 Aramco employees, including Lebanese Shi’a, are being investigated for involvement in the attack.

The real reason behind the attack appears to be the dispute between Iran and Saudi Aramco Over Oil Embargo placed upon Iran by the U.S. and the European Union on July 1st, 2012.

The response of Teheran is the menace to close the Strait of Hormuz to respond to the embargo but many experts are sure that Iran is also financing cyber attacks to destroy companies such as Saudi Aramco that is sustaining the penalties against the country.

Due the reasons exposed it is reasonable to assume that Iran is one of the main suspects for the attack on the oil company.
We must get used to this kind of events that hardly show the real responsible but which are capable of causing considerable damage.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Saudi Aramco, Shamoon)

[adrotate banner=”9″]

[adrotate banner=”9″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

6 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

13 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

13 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

18 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

2 days ago

This website uses cookies.