{"id":68479,"date":"2017-01-27T10:59:46","date_gmt":"2017-01-27T18:59:46","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=68479"},"modified":"2025-06-05T18:48:27","modified_gmt":"2025-06-06T01:48:27","slug":"spotlight-on-shamoon","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/","title":{"rendered":"Spotlight on Shamoon"},"content":{"rendered":"<p>Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our earlier blogs <a href=\"https:\/\/securingtomorrow.mcafee.com\/\">(on mcafee.com).<\/a> The campaign continues to target organizations in the Middle East from a variety of verticals. Reports suggest that a further 15 disk-wiping Shamoon incidents have occurred in public and private sectors.<\/p>\n<h2>Rev.2 campaign<\/h2>\n<p>The code for the current revision is almost identical to the original version: Changes include the addition of a victim\u2019s credentials to spread and execute the wiper in a large part of the environment. In the following screenshot, we can see that the old encoded resource names PKCS12, PKCS7, and X509 are still present in the new variants but not used.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68489\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.47.27 AM\" width=\"600\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM-300x144.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A question that many of us in the industry have asked ourselves is How were the attackers able to gain the credentials from so many victims in the Middle East? Let\u2019s approach this from the attacker\u2019s view and follow the Cyber Kill Chain steps.<\/p>\n<h2><strong>Reconnaissance<\/strong><\/h2>\n<p>An attack group prepares a plan and identifies the victims it wants to hit to create an impact or make a statement. The group gathers email addresses and other open-source intelligence as the first step to preparing for the campaign. They register domains, code backdoors, and prepare for the reconnaissance phase. When all is tested, the initial attack starts with spear phishing:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68490\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.12-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.47.12 AM\" width=\"681\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.12-AM.png 681w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.12-AM-300x92.png 300w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/p>\n<p>The victims receive emails, for example, one like the preceding business proposal. The email also contains a tempting attachment. When opening the attachment, some victims saw this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68492\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.49.37-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.49.37 AM\" width=\"491\" height=\"229\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.49.37-AM.png 491w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.49.37-AM-300x140.png 300w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/p>\n<p>Any requirement to activate macros before seeing content should set off alarm bells. Analyzing the document, we received confirmation of our suspicions:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68494\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.48-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.46.48 AM\" width=\"601\" height=\"304\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.48-AM.png 601w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.48-AM-300x152.png 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/p>\n<p>Decoding the obfuscated macro code results in a PowerShell script that proceeds to download a file, a Trojan capable of gathering system information and downloading other tools.<\/p>\n<p>In other cases, we found a backdoor using a PowerShell script to gather information from the system and write to a temporary file. A\u00a0code snippet:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68495\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.25-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.46.25 AM\" width=\"698\" height=\"376\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.25-AM.png 698w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.25-AM-300x162.png 300w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/p>\n<p>We also found a script that creates an instance of Mimikatz, a tool known to dump user credentials from a computer:<\/p>\n<ul>\n<li>CreateMimi1.Bat or CreateMimi2.Bat<\/li>\n<\/ul>\n<p>When all the data are gathered, the information is uploaded. To open a command channel, the attackers used, for example, a PowerShell script that launches <a href=\"https:\/\/github.com\/secabstraction\/PowerCat\">Powercat,<\/a> a TCP\/IP &#8220;Swiss army knife&#8221; that works with netcat. A code example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68497\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.04-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.46.04 AM\" width=\"695\" height=\"48\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.04-AM.png 695w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.46.04-AM-300x21.png 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/p>\n<h2><strong>Weaponization<\/strong><\/h2>\n<p>The attackers invariably sort the credentials of the victims to gain an indication of the IP range and possible scale of the network. Depending on the goal of the attack, a selection of victims can be made to serve the cause. From the original Shamoon code, the current attackers have made several changes:<\/p>\n<ul>\n<li>Added victims&#8217; credentials<\/li>\n<li>Replaced picture from flag to boy<\/li>\n<li>Changed resource language to Yemeni Arabic<\/li>\n<li>Tested samples<\/li>\n<\/ul>\n<h2><strong>Delivery\/Exploitation\/Installation\/Control servers\/Action on objectives<\/strong><\/h2>\n<p>In these phases, the actors needed only one or two hosts in the victim\u2019s network as a beachhead to upload the wipers and scripts. Because the attackers already had valid credentials, no exploitation was needed.<\/p>\n<p>Batch file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68499\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.45.44-AM.png\" alt=\"Screen Shot 2017-01-27 at 10.45.44 AM\" width=\"695\" height=\"136\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.45.44-AM.png 695w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.45.44-AM-300x59.png 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/p>\n<p>The batch file copies ntertmgr32.exe (one of many filenames of the Shamoon 2 variant) and starts it. Once the hardcoded date was reached, systems were wiped. Objective accomplished.<\/p>\n<h2><strong>Actor sophistication<\/strong><\/h2>\n<p>Our analysis of the execution of this attack tells a story about the actors capability and skills. Their attack precision is very good; they know whom and what to attack, in this case to disrupt and leave a statement. Their focus is on Windows and they use well-known practices to gather information and credentials, with no zero days. From a coding perspective, many security industry colleagues have already commented on the sloppy coding practices. From an operations security perspective\u2014how well are the actors able to hide details that could lead to them?\u2014we noticed that quite a few details are available: email addresses, program database paths, and Yemeni Arabic as the language identifier of almost all the samples, although we discovered one sample with a different language identifier. Was that on purpose, or a slip by the actor because this was a large campaign?<\/p>\n<h2><strong>Indicators<\/strong><\/h2>\n<h4><strong>Domains:<\/strong><\/h4>\n<ul>\n<li>winappupdater.com<\/li>\n<li>update.winupdater.com<\/li>\n<li>\/\/ domain registered on 2016-11-25 by benyamin987@mail.com<\/li>\n<li>hash 146a112cb01cd4b8e06d36304f6bdf7b and bf4b07c7b4a4504c4192bd68476d63b5 were connecting to this site<\/li>\n<\/ul>\n<h4><strong>Hashes:<\/strong><\/h4>\n<ul>\n<li>146a112cb01cd4b8e06d36304f6bdf7b<\/li>\n<li>bf4b07c7b4a4504c4192bd68476d63b5<\/li>\n<li>a96d211795852b6b14e61327bbcc3473<\/li>\n<li>1507A4FDF65952DFA439E32480F42CCF1460B96F<\/li>\n<\/ul>\n<h4><strong>File locations and filenames:<\/strong><\/h4>\n<p>Collection of system information:<\/p>\n<ul>\n<li>&#8220;%localappdata%\\Microsoft\\Windows\\Tmp765643.txt&#8221; \/\/where Tmp[6digits].txt is the syntax\/\/<\/li>\n<\/ul>\n<p>Filenames and Locations:<\/p>\n<ul>\n<li>Microsoft\\Windows\\ccd<\/li>\n<li>Microsoft\\Windows\\ccd6.exe&#8221;<\/li>\n<li>Microsoft\\Windows\\ssc&#8221;<\/li>\n<li>Microsoft\\Windows\\tss.ps1&#8243;<\/li>\n<li>Microsoft\\Windows\\Tmp9932u1.bat&#8221;<\/li>\n<li>Microsoft\\Windows\\Tmp765643.txt&#8221;<\/li>\n<li>Microsoft\\Windows\\dp.ps1&#8243;<\/li>\n<li>Microsoft\\Windows\\ccd61.ps1<\/li>\n<li>Microsoft\\Windows\\dp.ps1&#8243;<\/li>\n<\/ul>\n<p>Interesting strings in code samples:<\/p>\n<ul>\n<li>F:\\Projects\\Bot Fresh\\Release\\Bot Fresh.pdb<\/li>\n<li>F:\\Projects\\Bot\\Bot\\Release\\Ism.pdb<\/li>\n<li>G:\\Projects\\Bot\\Bots\\Bot5\\Release\\Ism.pdb<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of&#8230;<\/p>\n","protected":false},"author":653,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4825],"coauthors":[3576,1359],"class_list":["post-68479","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-shamoon"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Spotlight on Shamoon | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spotlight on Shamoon | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-27T18:59:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T01:48:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christiaan Beek, Raj Samani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ChristiaanBeek\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christiaan Beek, Raj Samani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\"},\"author\":{\"name\":\"Christiaan Beek\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\"},\"headline\":\"Spotlight on Shamoon\",\"datePublished\":\"2017-01-27T18:59:46+00:00\",\"dateModified\":\"2025-06-06T01:48:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\",\"keywords\":[\"cybersecurity\",\"shamoon\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\",\"name\":\"Spotlight on Shamoon | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\",\"datePublished\":\"2017-01-27T18:59:46+00:00\",\"dateModified\":\"2025-06-06T01:48:27+00:00\",\"description\":\"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Spotlight on Shamoon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\",\"name\":\"Christiaan Beek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"caption\":\"Christiaan Beek\"},\"description\":\"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \\\"Hacking Exposed\\\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/christiaanbeek\/\",\"https:\/\/x.com\/ChristiaanBeek\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spotlight on Shamoon | McAfee Blog","description":"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Spotlight on Shamoon | McAfee Blog","og_description":"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-01-27T18:59:46+00:00","article_modified_time":"2025-06-06T01:48:27+00:00","og_image":[{"width":600,"height":288,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png","type":"image\/png"}],"author":"Christiaan Beek, Raj Samani","twitter_card":"summary_large_image","twitter_creator":"@ChristiaanBeek","twitter_site":"@McAfee","twitter_misc":{"Written by":"Christiaan Beek, Raj Samani","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/"},"author":{"name":"Christiaan Beek","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79"},"headline":"Spotlight on Shamoon","datePublished":"2017-01-27T18:59:46+00:00","dateModified":"2025-06-06T01:48:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/"},"wordCount":858,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png","keywords":["cybersecurity","shamoon"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/","name":"Spotlight on Shamoon | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png","datePublished":"2017-01-27T18:59:46+00:00","dateModified":"2025-06-06T01:48:27+00:00","description":"Our analysis this month has pointed to Shamoon emerging in the Middle East. We have recently seen a number of similarities that we had highlighted in our","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-27-at-10.47.27-AM.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/spotlight-on-shamoon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Spotlight on Shamoon"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79","name":"Christiaan Beek","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","caption":"Christiaan Beek"},"description":"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \"Hacking Exposed\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.","sameAs":["https:\/\/www.linkedin.com\/in\/christiaanbeek\/","https:\/\/x.com\/ChristiaanBeek"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/653"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=68479"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68479\/revisions"}],"predecessor-version":[{"id":215149,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68479\/revisions\/215149"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=68479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=68479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=68479"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=68479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}